opensuse-su-2022:0110-1
Vulnerability from csaf_opensuse
Published
2022-04-08 14:01
Modified
2022-04-08 14:01
Summary
Security update for opera
Notes
Title of the patch
Security update for opera
Description of the patch
This update for opera fixes the following issues:
Update to 85.0.4341.28
- CHR-8816 Update chromium on desktop-stable-99-4341
to 99.0.4844.84
- DNA-98092 Crash at views::MenuItemView::GetMenuController()
- DNA-98278 Translations for O85
- DNA-98320 [Mac] Unable to delete recent search entries
- DNA-98614 Show recent searches for non-BABE users
- DNA-98615 Allow removal of recent searches
- DNA-98616 Add recent searches to ‘old’ BABE
- DNA-98617 Make it possible to disable ad-blocker per-country
- DNA-98651 Remove Instagram and Facebook Messenger in Russia
- DNA-98653 Add flag #recent-searches
- DNA-98696 smoketest
PageInfoHistoryDataSourceTest.FormatTimestampString failing
- DNA-98703 Port Chromium issue 1309225 to Opera Stable
- The update to chromium 99.0.4844.84 fixes following issues:
CVE-2022-1096
- Changes in 85.0.4341.18
- CHR-8789 Update chromium on desktop-stable-99-4341 to
99.0.4844.51
- DNA-98059 [Linux] Crash at
opera::FreedomSettingsImpl::IsBypassForDotlessDomainsEnabled
- DNA-98349 [Linux] Crash at bluez::BluezDBusManager::Get()
- DNA-98126 System crash dialog shown on macOS <= 10.15
- DNA-98331 [Snap] Meme generator cropping / resizing broken
- DNA-98394 Audio tab indicator set to 'muted' on
videoconferencing sites
- DNA-98481 Report errors in opauto_collector
- The update to chromium 99.0.4844.51 fixes following issues:
CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792,
CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2022-0796,
CVE-2022-0797, CVE-2022-0798, CVE-2022-0799, CVE-2022-0800,
CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-2022-0804,
CVE-2022-0805, CVE-2022-0806, CVE-2022-0807, CVE-2022-0808,
CVE-2022-0809
- Changes in 85.0.4341.13
- DNA-94119 Upgrade curl to 7.81.0
- DNA-97849 [Mac monterey] System shortcut interfere with
Opera’s `ToggleSearchInOpenTabs` shortcut
- DNA-98204 Automatic popout happens when video is paused
- DNA-98231 Shortcuts are blocked by displayed tab tooltip
when triggered quickly after tooltip appears
- DNA-98321 Add thinlto-cache warnings to suppression list
- DNA-98395 Promote O85 to stable
- Complete Opera 85.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-85/
- Update to 84.0.4316.42
- DNA-94119 Upgrade curl to 7.81.0
- DNA-98092 Crash at views::MenuItemView::GetMenuController()
- DNA-98204 Automatic popout happens when video is paused
- DNA-98231 Shortcuts are blocked by displayed tab tooltip when
triggered quickly after tooltip appears
- Update to 84.0.4316.31
- CHR-8772 Update chromium on desktop-stable-98-4316 to
98.0.4758.109
- DNA-97573 [Win][Lin]”Close tab” button is not displayed on tabs
playing media when many tabs are open
- DNA-97729 cancelling the process uploading custom Wallpaper
crashes the browser
- DNA-97871 Google meet tab’s icons don’t fit on pinned tab
- DNA-97872 Tab is being unpinned when video conferencing
button is clicked
- DNA-98039 Dark theme top sites have black background
- DNA-98117 Clicking current tab information should hide tooltip
- Update to 84.0.4316.21
- CHR-8762 Update chromium on desktop-stable-98-4316 to
98.0.4758.102
- DNA-97333 ‘Add a site’ label on start page tile barely visible
- DNA-97691 Opera 84 translations
- DNA-97767 Wrong string in FR
- DNA-97855 Crash at
ScopedProfileKeepAlive::~ScopedProfileKeepAlive()
- DNA-97982 Enable #snap-upstream-implementation on all streams
- The update to chromium 98.0.4758.102 fixes following issues:
CVE-2022-0603, CVE-2022-0604, CVE-2022-0605, CVE-2022-0606,
CVE-2022-0607, CVE-2022-0608, CVE-2022-0609, CVE-2022-0610
- Update to 84.0.4316.14
- CHR-8753 Update chromium on desktop-stable-98-4316 to
98.0.4758.82
- DNA-97177 Battery saver – the icon looks bad for DPI!=100%
- DNA-97614 automatic video pop-out for most popular websites
broadcasting Winter Olympic Games 2022
- DNA-97804 Promote O84 to stable
- The update to chromium 98.0.4758.82 fixes following issues:
CVE-2022-0452, CVE-2022-0453, CVE-2022-0454, CVE-2022-0455,
CVE-2022-0456, CVE-2022-0457, CVE-2022-0458, CVE-2022-0459,
CVE-2022-0460, CVE-2022-0461, CVE-2022-0462, CVE-2022-0463,
CVE-2022-0464, CVE-2022-0465, CVE-2022-0466, CVE-2022-0467,
CVE-2022-0468, CVE-2022-0469, CVE-2022-0470
- Complete Opera 84.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-84/
- Update to 83.0.4254.54
- DNA-96581 Fast tab tooltip doesn’t always show related sites
with scrollable tab strip
- DNA-96608 Cannot drag a tab to create a new window
- DNA-96657 Do not make tab tooltip hoverable if there’s no
list of tabs
- DNA-97291 Crash at
opera::flow::FlowSessionImpl::RegisterDevice(base::OnceCallback)
- DNA-97468 Incorrect number of restored tabs when video-popout
is detached
- DNA-97476 Add retry to stapling during signing
- DNA-97609 Failing MetricsReporterTest.TimeSpent* smoketests
- Update to 83.0.4254.27
- CHR-8737 Update chromium on desktop-stable-97-4254 to
97.0.4692.99
- DNA-96336 [Mac] Translate new network installer slogan
- DNA-96678 Add battery level monitoring capability to
powerSavePrivate
- DNA-96939 Crash at
opera::ExternalVideoService::MarkAsManuallyClosed()
- DNA-97276 Enable #static-tab-audio-indicator on all streams
- The update to chromium 97.0.4692.99 fixes following issues:
CVE-2022-0289, CVE-2022-0290, CVE-2022-0291, CVE-2022-0292,
CVE-2022-0293, CVE-2022-0294, CVE-2022-0295, CVE-2022-0296,
CVE-2022-0297, CVE-2022-0298, CVE-2022-0300, CVE-2022-0301,
CVE-2022-0302, CVE-2022-0304, CVE-2022-0305, CVE-2022-0306,
CVE-2022-0307, CVE-2022-0308, CVE-2022-0309, CVE-2022-0310,
CVE-2022-0311
- Update to 83.0.4254.19
- DNA-96079 Turn on #automatic-video-popout on developer
- DNA-97070 Opera 83 translations
- DNA-97119 [LastCard] Stop showing used burner cards
- DNA-97131 Enable automatic-video-popout on all streams from
O84 on
- DNA-97257 Crash at
views::ImageButton::SetMinimumImageSize(gfx::Size const&)
- DNA-97259 Promote O83 to stable
- Complete Opera 83.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-83/
- Update to 83.0.4254.16
- DNA-96968 Fix alignment of the 'Advanced' button in Settings
- Update to 83.0.4254.14
- CHR-8701 Update chromium on desktop-stable-97-4254 to
97.0.4692.45
- CHR-8713 Update chromium on desktop-stable-97-4254 to
97.0.4692.56
- CHR-8723 Update chromium on desktop-stable-97-4254 to
97.0.4692.71
- DNA-96780 Crash at
ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)
- DNA-96822 Tab close resize behavior change
- DNA-96861 Create Loomi Options menu
- DNA-96904 Support Win11 snap layout popup
- DNA-96951 Tab close animation broken
- DNA-96991 Tab X button doesn’t work correctly
- DNA-97027 Incorrect tab size after tab close
- The update to chromium 97.0.4692.71 fixes following issues:
CVE-2022-0096, CVE-2022-0097, CVE-2022-0098, CVE-2022-0099,
CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103,
CVE-2022-0104, CVE-2022-0105, CVE-2022-0105, CVE-2022-0106,
CVE-2022-0107, CVE-2022-0108, CVE-2022-0109, CVE-2022-0110,
CVE-2022-0111, CVE-2022-0111, CVE-2022-0112, CVE-2022-0113,
CVE-2022-0114, CVE-2022-0115, CVE-2022-0116, CVE-2022-0117,
CVE-2022-0118, CVE-2022-0120
- Update to version 82.0.4227.58
- DNA-96780 Crash at
ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)
- DNA-96890 Settings default browser not working for current
user on Windows 7
- Update to version 82.0.4227.43
- CHR-8705 Update chromium on desktop-stable-96-4227 to
96.0.4664.110
- DNA-93284 Unstable
obj/opera/desktop/common/installer_rc_generated/installer.res
- DNA-95908 Interstitial/internal pages shown as NOT SECURE
after visiting http site
- DNA-96404 Opera doesn’t show on main screen when second screen
is abruptly disconnected
- The update to chromium 96.0.4664.110 fixes following issues:
CVE-2021-4098, CVE-2021-4099, CVE-2021-4100, CVE-2021-4101,
CVE-2021-4102
- Update to version 82.0.4227.33
- CHR-8689 Update chromium on desktop-stable-96-4227 to
96.0.4664.93
- DNA-96559 Tooltip popup looks bad in dark theme
- DNA-96570 [Player] Tidal logging in via PLAY doesn’t work
- DNA-96594 Unnecessary extra space in fullscreen mode on M1 Pro MacBooks
- DNA-96649 Update Meme button
- DNA-96676 Add Icon in the Sidebar Setup
- DNA-96677 Add default URL
- The update to chromium 96.0.4664.93 fixes following issues:
CVE-2021-4052, CVE-2021-4053, CVE-2021-4079, CVE-2021-4054,
CVE-2021-4078, CVE-2021-4055, CVE-2021-4056, CVE-2021-4057,
CVE-2021-4058, CVE-2021-4059, CVE-2021-4061, CVE-2021-4062,
CVE-2021-4063, CVE-2021-4064, CVE-2021-4065, CVE-2021-4066,
CVE-2021-4067, CVE-2021-4068
- Update to version 82.0.4227.23
- DNA-95632 With new au-logic UUID is set with delay and may be
not set for pb-builds (when closing fast)
- DNA-96349 Laggy tooltip animation
- DNA-96483 [Snap][Linux] Video not working / wrong ffmpeg snap
version for Opera 82
- DNA-96493 Create 'small' enticement in credit card autofill
- DNA-96533 Opera 82 translations
- DNA-96535 Make the URL configurable
- DNA-96553 Add switch to whitelist test pages
- DNA-96557 Links not opened from panel
- DNA-96558 AdBlock bloks some trackers inside the panel
- DNA-96568 [Player] Tidal in sidebar Player opens wrong site
when logging in
- DNA-96659 Siteprefs not applied after network service crash
- DNA-96593 Promote O82 to stable
- Complete Opera 82.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-82/
- Update to version 82.0.4227.13
- CHR-8668 Update chromium on desktop-stable-96-4227 to
96.0.4664.45
- DNA-76987 [Mac] Update desktop EULA with geolocation split
- DNA-93388 Problem with symlinks on windows when creating
file list
- DNA-95734 Discarded Recently Closed items get revived
after restart
- DNA-96134 'Your profile has been updated' does not disappear
- DNA-96190 Opera freezes when trying to drag expanded
bookmark folder with nested subfolders
- DNA-96223 Easy Files not working in Full Screen
- DNA-96274 Checkout autofill shouldn't show used burner card
- DNA-96275 Change the notification message for pausing
multi-use cards
- DNA-96295 'Video pop out' setting doesn't sync
- DNA-96316 Highlight text wrong colour on dark mode
- DNA-96326 Wrong translation Private Mode > Turkish
- DNA-96351 macOS window controls are missing in full screen
- DNA-96440 Update video URL
- DNA-96448 add option to pin extension via rich hints
- DNA-96453 Register user-chosen option on client-side, read on
hint side
- DNA-96454 Choosing an option from the settings menu should
close the popup
- DNA-96484 Enable AB test for a new autoupdater logic (for 50%)
- DNA-96500 Add 'don't show me again' prefs to allowed whitelist
- DNA-96538 Inline audiocomplete for www.mediaexpert.pl
incorrectly suggested
- The update to chromium 96.0.4664.45 fixes following issues:
CVE-2021-38005, CVE-2021-38006, CVE-2021-38007, CVE-2021-38008,
CVE-2021-38009, CVE-2021-38010, CVE-2021-38011, CVE-2021-38012,
CVE-2021-38013, CVE-2021-38014, CVE-2021-38015, CVE-2021-38016,
CVE-2021-38017, CVE-2021-38019, CVE-2021-38020, CVE-2021-38021,
CVE-2021-38022
- Update to version 81.0.4196.54
- CHR-8644 Update chromium on desktop-stable-95-4196 to
95.0.4638.69
- DNA-95773 ExtensionWebRequestApiTest crashes on mac
- DNA-96062 Opera 81 translations
- DNA-96134 “Your profile has been updated’ does not disappear
- DNA-96274 Checkout autofill shouldn’t show used burner card
- DNA-96275 Change the notification message for pausing
multi-use cards
- DNA-96440 Update video URL
- The update to chromium 95.0.4638.69 fixes following issues:
CVE-2021-37997, CVE-2021-37998, CVE-2021-37999, CVE-2021-37980,
CVE-2021-38001, CVE-2021-38002, CVE-2021-38003, CVE-2021-38004
- Update to version 81.0.4196.37
- DNA-96008 Crash at
content::WebContentsImpl::OpenURL(content::OpenURLParams const&)
- DNA-96032 Closing the videoconference pop-up force leaving
the meeting
- DNA-96092 Crash at void
opera::ModalDialogViews::OnWidgetClosing(opera::ModalDialog::Result)
- DNA-96142 [Yat] Emoji icon cut off in URL for Yat
- Update to version 81.0.4196.31
- DNA-95733 Implement the “Manage” menu in card details view
- DNA-95736 Update UI for paused card
- DNA-95791 Crash at base::operator<
- DNA-95794 Sometimes the sidebar UI fails to load
- DNA-95812 Retrieve cards info when showing autofill
- DNA-96035 Cannot create virtual card on Sandbox environment
- DNA-96147 “Buy” button does not work
- DNA-96168 Update contributors list
- DNA-96211 Enable #fast-tab-tooltip on all streams
- DNA-96231 Promote O81 to stable
- Complete Opera 80.1 changelog at:
https://blogs.opera.com/desktop/changelog-for-81/
- Update to version 81.0.4196.27
- CHR-8623 Update chromium on desktop-stable-95-4196 to
95.0.4638.54
- DNA-92384 Better segmenting of hint users
- DNA-95523 Allow sorting in multi-card view
- DNA-95659 Flow of Lastcard on first login
- DNA-95735 Implement the button that reveals full card
details
- DNA-95747 Better way to handle expired funding card
- DNA-95949 [Mac Retina] Clicking active tab should scroll
to the top
- DNA-95993 Update icon used for Yat in address bar dropdown
- DNA-96021 Cleared download item view is never deleted
- DNA-96036 Occupation field in 'Account – Edit' is shown
twice
- DNA-96127 Upgrade plan button does nothing
- DNA-96138 'Add Card' button does not change to
'Upgrade Plan' after adding card
- The update to chromium 95.0.4638.54 fixes following issues:
CVE-2021-37981, CVE-2021-37982, CVE-2021-37983, CVE-2021-37984,
CVE-2021-37985, CVE-2021-37986, CVE-2021-37987, CVE-2021-37988,
CVE-2021-37989, CVE-2021-37990, CVE-2021-37991, CVE-2021-37992,
CVE-2021-37993, CVE-2021-37994, CVE-2021-37995, CVE-2021-37996
- Update to version 80.0.4170.72
- DNA-95522 Change card view to show all types of cards
- DNA-95523 Allow sorting in multi-card view
- DNA-95524 Allow searching for cards by name
- DNA-95658 Allow user to add a card
- DNA-95659 Flow of Lastcard on first login
- DNA-95660 Implement editing card details
- DNA-95699 Add card details view
- DNA-95733 Implement the “Manage” menu in card details view
- DNA-95735 Implement the button that reveals full card details
- DNA-95736 Update UI for paused card
- DNA-95747 Better way to handle expired funding card
- DNA-95794 Sometimes the sidebar UI fails to load
- DNA-95812 Retrieve cards info when showing autofill
- DNA-96036 Occupation field in ‘Account – Edit’ is shown twice
- DNA-96127 Upgrade plan button does nothing
- DNA-96138 “Add Card” button does not change to “Upgrade Plan”
after adding card
- Update to version 80.0.4170.63
- CHR-8612 Update chromium on desktop-stable-94-4170 to
94.0.4606.81
- DNA-95434 Crash at opera::ThemesService::UpdateCurrentTheme()
- The update to chromium 94.0.4606.81 fixes following issues:
CVE-2021-37977, CVE-2021-37978, CVE-2021-37979, CVE-2021-37980
- Update to version 80.0.4170.40
- CHR-8598 Update chromium on desktop-stable-94-4170 to
94.0.4606.71
- DNA-95221 Emoji button stuck in address bar
- DNA-95325 Make y.at navigations to be reported with
page_views events
- DNA-95327 Add “Emojis” context menu option in address
bar field
- DNA-95339 Add YAT emoji url suggestion to search© dialog
- DNA-95416 Remove emoji button from address bar
- DNA-95439 Enable #yat-emoji-addresses on developer stream
- DNA-95441 [Mac big sur] Emoji are not shown in address
bar url
- DNA-95514 Crash at resource_coordinator::TabLifecycleUnitSource
::TabLifecycleUnit::OnLifecycleUnitStateChanged(mojom::
LifecycleUnitState, mojom::LifecycleUnitStateChangeReason)
- DNA-95746 Enable #reader-mode everywhere
- DNA-95865 Numbers are recognized as emojis
- DNA-95866 Change Yat text in selection popup
- DNA-95867 Show that buttons are clickable in selection popup
- The update to chromium 94.0.4606.71 fixes following issues:
CVE-2021-37974, CVE-2021-37975, CVE-2021-37976
- Update to version 80.0.4170.16
- CHR-8590 Update chromium on desktop-stable-94-4170
to 94.0.4606.61
- DNA-95347 Make InstallerStep::Run async
- DNA-95420 First suggestion in address field is often not
highlighted
- DNA-95613 Browser closing itself after closing SD/first tab
and last opened tab
- DNA-95725 Promote O80 to stable
- DNA-95781 Import fixes for CVE-2021-37975, CVE-2021-37976 and
CVE-2021-37974 to desktop-stable-94-4170
- Complete Opera 80.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-80/
- Drop Provides/Obsoletes for opera-gtk and opera-kde4
opera-gtk and opera-kde4 were last used in openSUSE 13.1
- Drop post/postun for desktop_database_post and
icon_theme_cache_post because were last used before
openSUSE 15.0
- Update to version 79.0.4143.72
- DNA-94933 Add emoji panel to address bar
- DNA-95210 Add emoji YAT address bar suggestions
- DNA-95221 Emoji button stuck in address bar
- DNA-95325 Make y.at navigations to be reported with page_views
events
- DNA-95327 Add “Emojis” context menu option in address bar field
- DNA-95339 Add YAT emoji url suggestion to search© dialog
- DNA-95364 Add browser feature flag
- DNA-95416 Remove emoji button from address bar
- DNA-95439 Enable #yat-emoji-addresses on developer stream
- DNA-95441 [Mac big sur] Emoji are not shown in address bar url
- DNA-95445 Crash when removing unsynced pinboard bookmark with
sync enabled
- DNA-95512 Allow to show title and timer for simple banners
- DNA-95516 Wrong label in settings for themes
- DNA-95679 Temporarily disable AB test for a new autoupdater
logic
- Update to version 79.0.4143.50
- CHR-8571 Update chromium on desktop-stable-93-4143
to 93.0.4577.82
- DNA-94104 ContinueShoppingOnEbayBrowserTest.ShouldDisplayOffers
TilesStartingWithMostActiveOnes fails
- DNA-94894 [Rich Hint] Agent API permissions
- DNA-94989 Wrong color and appearance of subpages in the settings
- DNA-95241 “Switch to tab” button is visible only on hover
- DNA-95286 Add unit tests to pinboard sync related logic in browser
- DNA-95372 [Mac retina screen] Snapshot doesnt capture cropped area
- DNA-95526 Some webstore extensions are not verified properly
- The update to chromium 93.0.4577.82 fixes following issues:
CVE-2021-30625, CVE-2021-30626, CVE-2021-30627, CVE-2021-30628,
CVE-2021-30629, CVE-2021-30630, CVE-2021-30631, CVE-2021-30632,
CVE-2021-30633
- Update to version 79.0.4143.22
- CHR-8550 Update chromium on desktop-stable-93-4143 to
93.0.4577.58
- CHR-8557 Update chromium on desktop-stable-93-4143 to
93.0.4577.63
- DNA-94641 [Linux] Proprietary media codecs not working in
snap builds
- DNA-95076 [Linux] Page crash with media content
- DNA-95084 [Mac] Cannot quit through menu with snapshot
editor open
- DNA-95138 Add setting to synchronize Pinboards
- DNA-95157 Crash at -[OperaCrApplication sendEvent:]
- DNA-95204 Opera 79 translations
- DNA-95240 The pinboard thumbnail cannot be generated anymore
- DNA-95278 Existing Pinboards might be missing
- DNA-95292 Enable #bookmarks-trash-cleaner on all streams
- DNA-95293 Enable #easy-files-downloads-folder on all streams
- DNA-95383 Promote O79 to stable
- Complete Opera 79.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-79/
- The update to chromium 93.0.4577.58 fixes following issues:
CVE-2021-30606, CVE-2021-30607, CVE-2021-30608, CVE-2021-30609,
CVE-2021-30610, CVE-2021-30611, CVE-2021-30612, CVE-2021-30613,
CVE-2021-30614, CVE-2021-30615, CVE-2021-30616, CVE-2021-30617,
CVE-2021-30618, CVE-2021-30619, CVE-2021-30620, CVE-2021-30621,
CVE-2021-30622, CVE-2021-30623, CVE-2021-30624
- Update to version 78.0.4093.184
- CHR-8533 Update chromium on desktop-stable-92-4093 to
92.0.4515.159
- DNA-93472 Reattaching to other browsers
- DNA-93741 Multiple hint slots
- DNA-93742 Allow displaying unobtrusive external hints
- DNA-93744 Add slots in toolbar action view
- DNA-94230 Improve text contrast for Speed Dials
- DNA-94724 [Mac] Add macOS dark theme wallpaper with easy setup
- DNA-94786 Crash at base::SupportsUserData::
SetUserData(void const*, std::__1::unique_ptr)
- DNA-94807 Allow scripts access opera version and product info
- DNA-94862 Continue on shopping Amazon doesn’t work correct
- DNA-94870 Add an addonsPrivate function to install with
permissions dialog first
- DNA-95064 Revert DNA-93714 on stable
- The update to chromium 92.0.4515.159 fixes following issues:
CVE-2021-30598, CVE-2021-30599, CVE-2021-30600, CVE-2021-30601,
CVE-2021-30602, CVE-2021-30603, CVE-2021-30604
- Update to version 78.0.4093.147
- CHR-8251 Update chromium on desktop-stable-92-4093
to 92.0.4515.131
- DNA-93036 Opera not starting after closing window.
Processes still working.
- DNA-94516 Add ‘Detach tab’ entry to tab menu
- DNA-94584 [Mac] Sidebar setup not closed after press
‘Add extensions’ button
- DNA-94761 Crash when trying to record “Chrome developer” trace
- DNA-94790 Crash at opera::VideoConferenceTabDetachController::
OnBrowserAboutToStartClosing(Browser*)
- The update to chromium 92.0.4515.131 fixes following issues:
CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593,
CVE-2021-30594, CVE-2021-30596, CVE-2021-30597
- Update to version 78.0.4093.112
- DNA-94466 Implement sorting Pinboards in overview
- DNA-94582 Add access to APIs for showing pinboard icon in
sidebar
- DNA-94603 Suspicious pinboards events
- DNA-94625 Disable opr.pinboardPrivate.getThumbnail() for
local files
- DNA-94640 Promote O78 to stable
- DNA-94661 Missing translations for some languages
- Complete Opera 78.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-78/
- Update to version 77.0.4054.277
- CHR-8502 Update chromium on desktop-stable-91-4054 to
91.0.4472.164
- DNA-94291 Video conference popout doesnt remember its size
after resizing
- DNA-94399 Incorrect icon for wp.pl in address bar dropdown
- DNA-94462 Low quality of default wallpaper on windows
- The update to chromium 91.0.4472.164 fixes following issues:
CVE-2021-30541, CVE-2021-30560, CVE-2021-30561, CVE-2021-30562,
CVE-2021-30563, CVE-2021-30564
- Update to version 77.0.4054.254
- DNA-92344 Windows 10 Implementation
- DNA-92486 Replace ⓧ icon with “settings” icon
- DNA-92487 Close individual item
- DNA-92496 Create separate entry in settings for BABE
- DNA-93275 Implement cycles size according to design
- DNA-93280 The system theme has only half a checkmark
- DNA-93728 Whatsapp notification is not refreshed
- DNA-94047 Remove pinboard WebUI integration
- DNA-94118 Write test for ThumbnailTabHelper changes in DNA-94100
- DNA-94120 Fix Welcome popup layout
- DNA-94140 Crash at base::TaskRunner
::PostTask(base::Location const&, base::OnceCallback)
- DNA-94205 Consider setting pinboard display URL in
address_field_helper.cc
- DNA-94211 Easy Files don’t show thumbnails
- DNA-94309 Pinboards URLs don’t get lighter color treatment
- DNA-94318 Wrong ‘Transparency’ word translation in Swedish
- DNA-94321 AB test: google suggestions on top – bigger test
- DNA-94341 Make pinboard popup testable on web page
- DNA-94381 Disabling Pinboards doesn’t remove item from
menu / sidebar
- DNA-94392 Add u2f-devices interface to snap packages
- DNA-94461 Enable #system-theme on all streams
- Update to version 77.0.4054.203
- CHR-8475 Update chromium on desktop-stable-91-4054 to
91.0.4472.124
- DNA-93523 Crash at extensions::TabHelper::WebContentsDestroyed()
- DNA-93917 Upload snap to edge while preparing repository package
- DNA-94157 Crash at gfx::ICCProfile::operator=(gfx::ICCProfile const&)
- DNA-94159 Crash at opera::auth::AuthAccountServiceImpl::GetAuthAccount()
- DNA-94161 [Add tabs]Unexpected symbols instead of Workspace name
- DNA-94241 Implement better process killing for timeout
- DNA-94248 Allow retry on tests that timed-out
- DNA-94251 heap-use-after-free in VideoConference
- DNA-94315 Crash at class std::__1::basic_string ui::ResourceBundle::
LoadLocaleResources(const class std::__1::basic_string& const, bool)
- DNA-94357 Fix issue in scripts
- Update to version 77.0.4054.172
- DNA-93078 Do not display ‘share tab’ sliding toolbar on
detached tab
- DNA-93358 The red underline extends beyond the Google meets
conference tab outline
- DNA-93404 Crash in test when destroying BABE’s webcontents
- DNA-93637 ctrl+9 shortcut is inconsistent with other browsers
- DNA-93661 Add opauto test to cover new shortcut from DNA-93637
- DNA-93867 Use version from package instead of repository
- DNA-93993 Pinboard translations from Master
- DNA-94099 Increase new-autoupdater-logic AB test to cover
50% of new installations
- DNA-94100 Thumbnail doesn’t update
- DNA-94178 Automatic popout should not happen after manually
closing a popout
- Update to version 77.0.4054.146
- CHR-8458 Update chromium on desktop-stable-91-4054 to
91.0.4472.114
- DNA-92171 Create active linkdiscovery service
- DNA-92388 Fix and unskip
WorkspacesEmoji.testChooseEmojiAsWorkspaceIcon when possible
- DNA-93101 Tabs are being snoozed when tab snoozing is disabled
- DNA-93386 Update pinboard view when item changes
- DNA-93448 Make browser ready for Developer release
- DNA-93491 Fix failing tests after enabling #pinboard flag
- DNA-93498 Add additional music services
- DNA-93503 Blank popup on clicking toolbar icon with popup open
- DNA-93561 Do not allow zoom different from 100% in Pinboard popup
- DNA-93637 ctrl+9 shortcut is inconsistent with other browsers
- DNA-93644 Create route for `import open tabs` to `pinboard`
- DNA-93664 Adapt popup to design
- DNA-93702 Turn on flags on developer
- DNA-93737 [Pinboard] Remove Mock API
- DNA-93745 Unable to open the popup after opening it several times
- DNA-93776 Popup closes and reopens when clicking the toolbar button
- DNA-93786 DCHECK after opening popup
- DNA-93802 Crash at views::Widget::GetNativeView() const
- DNA-93810 Add pinboard icon to sidebar
- DNA-93825 Add pinboard to Opera menu
- DNA-93833 [Player] Implement seeking for new services
- DNA-93845 Do not log output of snapcraft on console
- DNA-93864 Create feature flag for start page sync banner
- DNA-93865 Implement start page banner
- DNA-93867 Use version from package instead of repository
- DNA-93878 [Player] Crash when current player service becomes
unavailable when user location changes
- DNA-93953 ‘Send image to Pinboard’ has the wrong position
in the context menu
- DNA-93987 Disable zooming popup contents like in other popups
- DNA-93989 Change internal URL to opera://pinboards
- DNA-93990 Update strings to reflect new standards
- DNA-93992 Add Pinboards to Opera settings
- DNA-93993 Pinboard translations from Master
- DNA-94011 Enable feature flags for Reborn 5 on stable
- DNA-94019 Add a direct link to settings
- DNA-94088 Internal pages provoke not saving other pages to
the Pinboard
- DNA-94111 [O77] Sidebar setup does not open
- DNA-94139 Crash at
opera::(anonymous namespace)::PinboardPopupWebView::RemovedFromWidget()
- The update to chromium 91.0.4472.114 fixes following issues:
CVE-2021-30554, CVE-2021-30555, CVE-2021-30556, CVE-2021-30557
- Update to version 77.0.4054.90
- CHR-8446 Update chromium on desktop-stable-91-4054 to
91.0.4472.101
- The update to chromium 91.0.4472.101 fixes following issues:
CVE-2021-30544, CVE-2021-30545, CVE-2021-30546, CVE-2021-30547,
CVE-2021-30548, CVE-2021-30549, CVE-2021-30550, CVE-2021-30551,
CVE-2021-30552, CVE-2021-30553
- Update to version 77.0.4054.80
- DNA-93656 Active cards in checkout Auto-fill
- DNA-93805 Create snap packages in buildsign
- DNA-93823 archive_opera_snap failures on Linux
- DNA-93844 Fix AttributeError in package_type.py
- Update to version 77.0.4054.64
- DNA-93159 Implement image(preview) of each created pinboard
- DNA-93273 ‘Send image to Pinboard’ doesn’t work correct on
staging server
- DNA-93277 Add/update opauto tests for the System Theme WP1
implementation p.1
- DNA-93286 [BigSur] YT not being reloaded when opened from link
- DNA-93296 Opera 77 translations
- DNA-93372 Build new edition for Axel Springer
- DNA-93376 Write unittests for PinboardImageCollector
- DNA-93401 [LastCard] Do not change user state if not needed
- DNA-93409 Animation with hat and glasses is missing in
Private mode
- DNA-93443 API opr.pinboardPrivate.getThumbnail() returns
old thumbnail image
- DNA-93509 Add Opera switch for pinboard staging backend
and use it for tests
- DNA-93519 [Sidebar] WhatsApp ‘Log out’ doesn’t work
- DNA-93634 Fix errors in Slovak translations
- DNA-93724 Some webstore extensions are not verified properly
- Complete Opera 77.0 changelog at:
https://blogs.opera.com/desktop/changelog-for-77/
- Update to version 76.0.4017.177
- DNA-92597 Sound controller doesn’t work after pressing
‘Next’ button
- DNA-93405 Import vmp_signer instead of starting new python
process
- DNA-93406 [Mac] Import plist_util instead of calling script
in _generateAppEntitlements
- DNA-93442 Make GX Control panel attachable by webdriver
- DNA-93554 [AdBlock] Find a fix for blocking ‘new’ YouTube ads
- DNA-93587 Pre-refactor solution
- Update to version 76.0.4017.154
- CHR-8420 Update chromium on desktop-stable-90-4017 to
90.0.4430.212
- DNA-92411 Bookmarks breadcrumbs wrong color when pressed in
dark mode
- DNA-92587 Sync settings: “Use old password” button doesn’t work
- DNA-92672 Make it possible for agent to inject scripts into
startpage
- DNA-92712 Add SD reload API
- DNA-93190 The bookmark can’t be opened in Workspace 5-6
- DNA-93247 Reopen last closed tab shortcut opens random tab on
new window
- DNA-93294 Binary diff for opera_browser.dll is not created on
32-bit builds
- DNA-93313 Add opauto test to cover DNA-93190
- DNA-93368 Fix an error in Polish translation
- DNA-93408 [Windows] widevine_cdm_component_installer does not
compile on desktop-stable-90-4017
- The update to chromium 90.0.4430.212 fixes following issues:
CVE-2021-30506, CVE-2021-30507, CVE-2021-30508, CVE-2021-30509,
CVE-2021-30510, CVE-2021-30511, CVE-2021-30512, CVE-2021-30513,
CVE-2021-30514, CVE-2021-30515, CVE-2021-30516, CVE-2021-30517,
CVE-2021-30518, CVE-2021-30519, CVE-2021-30520
Patchnames
openSUSE-2022-110
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for opera",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for opera fixes the following issues:\n\nUpdate to 85.0.4341.28\n\n - CHR-8816 Update chromium on desktop-stable-99-4341\n to 99.0.4844.84\n - DNA-98092 Crash at views::MenuItemView::GetMenuController()\n - DNA-98278 Translations for O85\n - DNA-98320 [Mac] Unable to delete recent search entries\n - DNA-98614 Show recent searches for non-BABE users\n - DNA-98615 Allow removal of recent searches\n - DNA-98616 Add recent searches to \u2018old\u2019 BABE\n - DNA-98617 Make it possible to disable ad-blocker per-country\n - DNA-98651 Remove Instagram and Facebook Messenger in Russia\n - DNA-98653 Add flag #recent-searches\n - DNA-98696 smoketest \n PageInfoHistoryDataSourceTest.FormatTimestampString failing\n - DNA-98703 Port Chromium issue 1309225 to Opera Stable\n\n- The update to chromium 99.0.4844.84 fixes following issues: \n CVE-2022-1096\n- Changes in 85.0.4341.18\n\n - CHR-8789 Update chromium on desktop-stable-99-4341 to\n 99.0.4844.51\n - DNA-98059 [Linux] Crash at\n opera::FreedomSettingsImpl::IsBypassForDotlessDomainsEnabled\n - DNA-98349 [Linux] Crash at bluez::BluezDBusManager::Get()\n - DNA-98126 System crash dialog shown on macOS \u003c= 10.15\n - DNA-98331 [Snap] Meme generator cropping / resizing broken\n - DNA-98394 Audio tab indicator set to \u0027muted\u0027 on\n videoconferencing sites\n - DNA-98481 Report errors in opauto_collector\n- The update to chromium 99.0.4844.51 fixes following issues:\n CVE-2022-0789, CVE-2022-0790, CVE-2022-0791, CVE-2022-0792,\n CVE-2022-0793, CVE-2022-0794, CVE-2022-0795, CVE-2022-0796,\n CVE-2022-0797, CVE-2022-0798, CVE-2022-0799, CVE-2022-0800,\n CVE-2022-0801, CVE-2022-0802, CVE-2022-0803, CVE-2022-0804,\n CVE-2022-0805, CVE-2022-0806, CVE-2022-0807, CVE-2022-0808,\n CVE-2022-0809\n\n- Changes in 85.0.4341.13\n\n - DNA-94119 Upgrade curl to 7.81.0\n - DNA-97849 [Mac monterey] System shortcut interfere with\n Opera\u2019s `ToggleSearchInOpenTabs` shortcut\n - DNA-98204 Automatic popout happens when video is paused\n - DNA-98231 Shortcuts are blocked by displayed tab tooltip\n when triggered quickly after tooltip appears\n - DNA-98321 Add thinlto-cache warnings to suppression list\n - DNA-98395 Promote O85 to stable\n\n- Complete Opera 85.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-85/\n\n- Update to 84.0.4316.42\n\n - DNA-94119 Upgrade curl to 7.81.0\n - DNA-98092 Crash at views::MenuItemView::GetMenuController()\n - DNA-98204 Automatic popout happens when video is paused\n - DNA-98231 Shortcuts are blocked by displayed tab tooltip when\n triggered quickly after tooltip appears\n\n- Update to 84.0.4316.31\n - CHR-8772 Update chromium on desktop-stable-98-4316 to\n 98.0.4758.109\n - DNA-97573 [Win][Lin]\u201dClose tab\u201d button is not displayed on tabs\n playing media when many tabs are open\n - DNA-97729 cancelling the process uploading custom Wallpaper\n crashes the browser\n - DNA-97871 Google meet tab\u2019s icons don\u2019t fit on pinned tab\n - DNA-97872 Tab is being unpinned when video conferencing\n button is clicked\n - DNA-98039 Dark theme top sites have black background\n - DNA-98117 Clicking current tab information should hide tooltip\n\n- Update to 84.0.4316.21\n - CHR-8762 Update chromium on desktop-stable-98-4316 to\n 98.0.4758.102\n - DNA-97333 \u2018Add a site\u2019 label on start page tile barely visible\n - DNA-97691 Opera 84 translations\n - DNA-97767 Wrong string in FR\n - DNA-97855 Crash at\n ScopedProfileKeepAlive::~ScopedProfileKeepAlive()\n - DNA-97982 Enable #snap-upstream-implementation on all streams\n- The update to chromium 98.0.4758.102 fixes following issues:\n CVE-2022-0603, CVE-2022-0604, CVE-2022-0605, CVE-2022-0606, \n CVE-2022-0607, CVE-2022-0608, CVE-2022-0609, CVE-2022-0610\n\n- Update to 84.0.4316.14\n - CHR-8753 Update chromium on desktop-stable-98-4316 to\n 98.0.4758.82\n - DNA-97177 Battery saver \u2013 the icon looks bad for DPI!=100%\n - DNA-97614 automatic video pop-out for most popular websites\n broadcasting Winter Olympic Games 2022\n - DNA-97804 Promote O84 to stable\n- The update to chromium 98.0.4758.82 fixes following issues:\n CVE-2022-0452, CVE-2022-0453, CVE-2022-0454, CVE-2022-0455,\n CVE-2022-0456, CVE-2022-0457, CVE-2022-0458, CVE-2022-0459,\n CVE-2022-0460, CVE-2022-0461, CVE-2022-0462, CVE-2022-0463,\n CVE-2022-0464, CVE-2022-0465, CVE-2022-0466, CVE-2022-0467,\n CVE-2022-0468, CVE-2022-0469, CVE-2022-0470\n- Complete Opera 84.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-84/\n\n- Update to 83.0.4254.54\n - DNA-96581 Fast tab tooltip doesn\u2019t always show related sites\n with scrollable tab strip\n - DNA-96608 Cannot drag a tab to create a new window\n - DNA-96657 Do not make tab tooltip hoverable if there\u2019s no\n list of tabs\n - DNA-97291 Crash at \n opera::flow::FlowSessionImpl::RegisterDevice(base::OnceCallback)\n - DNA-97468 Incorrect number of restored tabs when video-popout\n is detached\n - DNA-97476 Add retry to stapling during signing\n - DNA-97609 Failing MetricsReporterTest.TimeSpent* smoketests\n\n- Update to 83.0.4254.27\n - CHR-8737 Update chromium on desktop-stable-97-4254 to\n 97.0.4692.99\n - DNA-96336 [Mac] Translate new network installer slogan\n - DNA-96678 Add battery level monitoring capability to\n powerSavePrivate\n - DNA-96939 Crash at \n opera::ExternalVideoService::MarkAsManuallyClosed()\n - DNA-97276 Enable #static-tab-audio-indicator on all streams\n- The update to chromium 97.0.4692.99 fixes following issues:\n CVE-2022-0289, CVE-2022-0290, CVE-2022-0291, CVE-2022-0292,\n CVE-2022-0293, CVE-2022-0294, CVE-2022-0295, CVE-2022-0296,\n CVE-2022-0297, CVE-2022-0298, CVE-2022-0300, CVE-2022-0301,\n CVE-2022-0302, CVE-2022-0304, CVE-2022-0305, CVE-2022-0306,\n CVE-2022-0307, CVE-2022-0308, CVE-2022-0309, CVE-2022-0310,\n CVE-2022-0311\n\n- Update to 83.0.4254.19\n - DNA-96079 Turn on #automatic-video-popout on developer\n - DNA-97070 Opera 83 translations\n - DNA-97119 [LastCard] Stop showing used burner cards\n - DNA-97131 Enable automatic-video-popout on all streams from\n O84 on\n - DNA-97257 Crash at \n views::ImageButton::SetMinimumImageSize(gfx::Size const\u0026)\n - DNA-97259 Promote O83 to stable\n- Complete Opera 83.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-83/\n- Update to 83.0.4254.16\n - DNA-96968 Fix alignment of the \u0027Advanced\u0027 button in Settings\n- Update to 83.0.4254.14\n - CHR-8701 Update chromium on desktop-stable-97-4254 to\n 97.0.4692.45\n - CHR-8713 Update chromium on desktop-stable-97-4254 to\n 97.0.4692.56\n - CHR-8723 Update chromium on desktop-stable-97-4254 to\n 97.0.4692.71\n - DNA-96780 Crash at\n ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)\n - DNA-96822 Tab close resize behavior change\n - DNA-96861 Create Loomi Options menu\n - DNA-96904 Support Win11 snap layout popup\n - DNA-96951 Tab close animation broken\n - DNA-96991 Tab X button doesn\u2019t work correctly\n - DNA-97027 Incorrect tab size after tab close\n- The update to chromium 97.0.4692.71 fixes following issues:\n CVE-2022-0096, CVE-2022-0097, CVE-2022-0098, CVE-2022-0099,\n CVE-2022-0100, CVE-2022-0101, CVE-2022-0102, CVE-2022-0103,\n CVE-2022-0104, CVE-2022-0105, CVE-2022-0105, CVE-2022-0106,\n CVE-2022-0107, CVE-2022-0108, CVE-2022-0109, CVE-2022-0110,\n CVE-2022-0111, CVE-2022-0111, CVE-2022-0112, CVE-2022-0113,\n CVE-2022-0114, CVE-2022-0115, CVE-2022-0116, CVE-2022-0117,\n CVE-2022-0118, CVE-2022-0120\n\n- Update to version 82.0.4227.58\n - DNA-96780 Crash at\n ui::NativeTheme::RemoveObserver(ui::NativeThemeObserver*)\n - DNA-96890 Settings default browser not working for current\n user on Windows 7\n\n- Update to version 82.0.4227.43\n - CHR-8705 Update chromium on desktop-stable-96-4227 to\n 96.0.4664.110\n - DNA-93284 Unstable\n obj/opera/desktop/common/installer_rc_generated/installer.res\n - DNA-95908 Interstitial/internal pages shown as NOT SECURE\n after visiting http site\n - DNA-96404 Opera doesn\u2019t show on main screen when second screen\n is abruptly disconnected\n- The update to chromium 96.0.4664.110 fixes following issues:\n CVE-2021-4098, CVE-2021-4099, CVE-2021-4100, CVE-2021-4101,\n CVE-2021-4102\n\n- Update to version 82.0.4227.33\n - CHR-8689 Update chromium on desktop-stable-96-4227 to\n 96.0.4664.93\n - DNA-96559 Tooltip popup looks bad in dark theme\n - DNA-96570 [Player] Tidal logging in via PLAY doesn\u2019t work\n - DNA-96594 Unnecessary extra space in fullscreen mode on M1 Pro MacBooks\n - DNA-96649 Update Meme button\n - DNA-96676 Add Icon in the Sidebar Setup\n - DNA-96677 Add default URL\n- The update to chromium 96.0.4664.93 fixes following issues:\n CVE-2021-4052, CVE-2021-4053, CVE-2021-4079, CVE-2021-4054,\n CVE-2021-4078, CVE-2021-4055, CVE-2021-4056, CVE-2021-4057,\n CVE-2021-4058, CVE-2021-4059, CVE-2021-4061, CVE-2021-4062,\n CVE-2021-4063, CVE-2021-4064, CVE-2021-4065, CVE-2021-4066,\n CVE-2021-4067, CVE-2021-4068\n\n- Update to version 82.0.4227.23\n - DNA-95632 With new au-logic UUID is set with delay and may be\n not set for pb-builds (when closing fast)\n - DNA-96349 Laggy tooltip animation\n - DNA-96483 [Snap][Linux] Video not working / wrong ffmpeg snap\n version for Opera 82\n - DNA-96493 Create \u0027small\u0027 enticement in credit card autofill\n - DNA-96533 Opera 82 translations\n - DNA-96535 Make the URL configurable\n - DNA-96553 Add switch to whitelist test pages\n - DNA-96557 Links not opened from panel\n - DNA-96558 AdBlock bloks some trackers inside the panel\n - DNA-96568 [Player] Tidal in sidebar Player opens wrong site\n when logging in\n - DNA-96659 Siteprefs not applied after network service crash\n - DNA-96593 Promote O82 to stable\n- Complete Opera 82.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-82/\n- Update to version 82.0.4227.13\n - CHR-8668 Update chromium on desktop-stable-96-4227 to\n 96.0.4664.45\n - DNA-76987 [Mac] Update desktop EULA with geolocation split\n - DNA-93388 Problem with symlinks on windows when creating\n file list\n - DNA-95734 Discarded Recently Closed items get revived\n after restart\n - DNA-96134 \u0027Your profile has been updated\u0027 does not disappear\n - DNA-96190 Opera freezes when trying to drag expanded\n bookmark folder with nested subfolders\n - DNA-96223 Easy Files not working in Full Screen\n - DNA-96274 Checkout autofill shouldn\u0027t show used burner card\n - DNA-96275 Change the notification message for pausing\n multi-use cards\n - DNA-96295 \u0027Video pop out\u0027 setting doesn\u0027t sync\n - DNA-96316 Highlight text wrong colour on dark mode\n - DNA-96326 Wrong translation Private Mode \u003e Turkish\n - DNA-96351 macOS window controls are missing in full screen\n - DNA-96440 Update video URL\n - DNA-96448 add option to pin extension via rich hints\n - DNA-96453 Register user-chosen option on client-side, read on\n hint side\n - DNA-96454 Choosing an option from the settings menu should\n close the popup\n - DNA-96484 Enable AB test for a new autoupdater logic (for 50%)\n - DNA-96500 Add \u0027don\u0027t show me again\u0027 prefs to allowed whitelist\n - DNA-96538 Inline audiocomplete for www.mediaexpert.pl\n incorrectly suggested\n- The update to chromium 96.0.4664.45 fixes following issues:\n CVE-2021-38005, CVE-2021-38006, CVE-2021-38007, CVE-2021-38008,\n CVE-2021-38009, CVE-2021-38010, CVE-2021-38011, CVE-2021-38012,\n CVE-2021-38013, CVE-2021-38014, CVE-2021-38015, CVE-2021-38016,\n CVE-2021-38017, CVE-2021-38019, CVE-2021-38020, CVE-2021-38021,\n CVE-2021-38022\n \n\n- Update to version 81.0.4196.54\n - CHR-8644 Update chromium on desktop-stable-95-4196 to\n 95.0.4638.69\n - DNA-95773 ExtensionWebRequestApiTest crashes on mac\n - DNA-96062 Opera 81 translations\n - DNA-96134 \u201cYour profile has been updated\u2019 does not disappear\n - DNA-96274 Checkout autofill shouldn\u2019t show used burner card\n - DNA-96275 Change the notification message for pausing\n multi-use cards\n - DNA-96440 Update video URL\n- The update to chromium 95.0.4638.69 fixes following issues:\n CVE-2021-37997, CVE-2021-37998, CVE-2021-37999, CVE-2021-37980,\n CVE-2021-38001, CVE-2021-38002, CVE-2021-38003, CVE-2021-38004 \n- Update to version 81.0.4196.37\n - DNA-96008 Crash at\n content::WebContentsImpl::OpenURL(content::OpenURLParams const\u0026)\n - DNA-96032 Closing the videoconference pop-up force leaving\n the meeting\n - DNA-96092 Crash at void\n opera::ModalDialogViews::OnWidgetClosing(opera::ModalDialog::Result)\n - DNA-96142 [Yat] Emoji icon cut off in URL for Yat\n\n- Update to version 81.0.4196.31\n - DNA-95733 Implement the \u201cManage\u201d menu in card details view\n - DNA-95736 Update UI for paused card\n - DNA-95791 Crash at base::operator\u003c\n - DNA-95794 Sometimes the sidebar UI fails to load\n - DNA-95812 Retrieve cards info when showing autofill\n - DNA-96035 Cannot create virtual card on Sandbox environment\n - DNA-96147 \u201cBuy\u201d button does not work\n - DNA-96168 Update contributors list\n - DNA-96211 Enable #fast-tab-tooltip on all streams\n - DNA-96231 Promote O81 to stable\n- Complete Opera 80.1 changelog at:\n https://blogs.opera.com/desktop/changelog-for-81/\n- Update to version 81.0.4196.27\n - CHR-8623 Update chromium on desktop-stable-95-4196 to\n 95.0.4638.54\n - DNA-92384 Better segmenting of hint users\n - DNA-95523 Allow sorting in multi-card view\n - DNA-95659 Flow of Lastcard on first login\n - DNA-95735 Implement the button that reveals full card\n details\n - DNA-95747 Better way to handle expired funding card\n - DNA-95949 [Mac Retina] Clicking active tab should scroll\n to the top\n - DNA-95993 Update icon used for Yat in address bar dropdown\n - DNA-96021 Cleared download item view is never deleted\n - DNA-96036 Occupation field in \u0027Account \u2013 Edit\u0027 is shown\n twice\n - DNA-96127 Upgrade plan button does nothing\n - DNA-96138 \u0027Add Card\u0027 button does not change to\n \u0027Upgrade Plan\u0027 after adding card\n- The update to chromium 95.0.4638.54 fixes following issues:\n CVE-2021-37981, CVE-2021-37982, CVE-2021-37983, CVE-2021-37984,\n CVE-2021-37985, CVE-2021-37986, CVE-2021-37987, CVE-2021-37988,\n CVE-2021-37989, CVE-2021-37990, CVE-2021-37991, CVE-2021-37992,\n CVE-2021-37993, CVE-2021-37994, CVE-2021-37995, CVE-2021-37996\n\n- Update to version 80.0.4170.72\n - DNA-95522 Change card view to show all types of cards\n - DNA-95523 Allow sorting in multi-card view\n - DNA-95524 Allow searching for cards by name\n - DNA-95658 Allow user to add a card\n - DNA-95659 Flow of Lastcard on first login\n - DNA-95660 Implement editing card details\n - DNA-95699 Add card details view\n - DNA-95733 Implement the \u201cManage\u201d menu in card details view\n - DNA-95735 Implement the button that reveals full card details\n - DNA-95736 Update UI for paused card\n - DNA-95747 Better way to handle expired funding card\n - DNA-95794 Sometimes the sidebar UI fails to load\n - DNA-95812 Retrieve cards info when showing autofill\n - DNA-96036 Occupation field in \u2018Account \u2013 Edit\u2019 is shown twice\n - DNA-96127 Upgrade plan button does nothing\n - DNA-96138 \u201cAdd Card\u201d button does not change to \u201cUpgrade Plan\u201d\n after adding card\n\n- Update to version 80.0.4170.63\n - CHR-8612 Update chromium on desktop-stable-94-4170 to\n 94.0.4606.81\n - DNA-95434 Crash at opera::ThemesService::UpdateCurrentTheme()\n- The update to chromium 94.0.4606.81 fixes following issues:\n CVE-2021-37977, CVE-2021-37978, CVE-2021-37979, CVE-2021-37980\n\n- Update to version 80.0.4170.40\n - CHR-8598 Update chromium on desktop-stable-94-4170 to\n 94.0.4606.71\n - DNA-95221 Emoji button stuck in address bar\n - DNA-95325 Make y.at navigations to be reported with\n page_views events\n - DNA-95327 Add \u201cEmojis\u201d context menu option in address\n bar field\n - DNA-95339 Add YAT emoji url suggestion to search\u00a9 dialog\n - DNA-95416 Remove emoji button from address bar\n - DNA-95439 Enable #yat-emoji-addresses on developer stream\n - DNA-95441 [Mac big sur] Emoji are not shown in address\n bar url\n - DNA-95514 Crash at resource_coordinator::TabLifecycleUnitSource\n ::TabLifecycleUnit::OnLifecycleUnitStateChanged(mojom::\n LifecycleUnitState, mojom::LifecycleUnitStateChangeReason)\n - DNA-95746 Enable #reader-mode everywhere\n - DNA-95865 Numbers are recognized as emojis\n - DNA-95866 Change Yat text in selection popup\n - DNA-95867 Show that buttons are clickable in selection popup\n- The update to chromium 94.0.4606.71 fixes following issues: \n CVE-2021-37974, CVE-2021-37975, CVE-2021-37976\n\n- Update to version 80.0.4170.16\n - CHR-8590 Update chromium on desktop-stable-94-4170\n to 94.0.4606.61\n - DNA-95347 Make InstallerStep::Run async\n - DNA-95420 First suggestion in address field is often not\n highlighted\n - DNA-95613 Browser closing itself after closing SD/first tab\n and last opened tab\n - DNA-95725 Promote O80 to stable\n - DNA-95781 Import fixes for CVE-2021-37975, CVE-2021-37976 and\n CVE-2021-37974 to desktop-stable-94-4170\n- Complete Opera 80.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-80/\n- Drop Provides/Obsoletes for opera-gtk and opera-kde4\n opera-gtk and opera-kde4 were last used in openSUSE 13.1\n- Drop post/postun for desktop_database_post and\n icon_theme_cache_post because were last used before\n openSUSE 15.0\n\n- Update to version 79.0.4143.72\n - DNA-94933 Add emoji panel to address bar\n - DNA-95210 Add emoji YAT address bar suggestions\n - DNA-95221 Emoji button stuck in address bar\n - DNA-95325 Make y.at navigations to be reported with page_views\n events\n - DNA-95327 Add \u201cEmojis\u201d context menu option in address bar field\n - DNA-95339 Add YAT emoji url suggestion to search\u00a9 dialog\n - DNA-95364 Add browser feature flag\n - DNA-95416 Remove emoji button from address bar\n - DNA-95439 Enable #yat-emoji-addresses on developer stream\n - DNA-95441 [Mac big sur] Emoji are not shown in address bar url\n - DNA-95445 Crash when removing unsynced pinboard bookmark with\n sync enabled\n - DNA-95512 Allow to show title and timer for simple banners\n - DNA-95516 Wrong label in settings for themes\n - DNA-95679 Temporarily disable AB test for a new autoupdater\n logic\n\n- Update to version 79.0.4143.50\n - CHR-8571 Update chromium on desktop-stable-93-4143\n to 93.0.4577.82\n - DNA-94104 ContinueShoppingOnEbayBrowserTest.ShouldDisplayOffers\n TilesStartingWithMostActiveOnes fails\n - DNA-94894 [Rich Hint] Agent API permissions\n - DNA-94989 Wrong color and appearance of subpages in the settings\n - DNA-95241 \u201cSwitch to tab\u201d button is visible only on hover\n - DNA-95286 Add unit tests to pinboard sync related logic in browser\n - DNA-95372 [Mac retina screen] Snapshot doesnt capture cropped area\n - DNA-95526 Some webstore extensions are not verified properly\n- The update to chromium 93.0.4577.82 fixes following issues:\n CVE-2021-30625, CVE-2021-30626, CVE-2021-30627, CVE-2021-30628,\n CVE-2021-30629, CVE-2021-30630, CVE-2021-30631, CVE-2021-30632,\n CVE-2021-30633\n\n- Update to version 79.0.4143.22\n - CHR-8550 Update chromium on desktop-stable-93-4143 to\n 93.0.4577.58\n - CHR-8557 Update chromium on desktop-stable-93-4143 to\n 93.0.4577.63\n - DNA-94641 [Linux] Proprietary media codecs not working in\n snap builds\n - DNA-95076 [Linux] Page crash with media content\n - DNA-95084 [Mac] Cannot quit through menu with snapshot\n editor open\n - DNA-95138 Add setting to synchronize Pinboards\n - DNA-95157 Crash at -[OperaCrApplication sendEvent:]\n - DNA-95204 Opera 79 translations\n - DNA-95240 The pinboard thumbnail cannot be generated anymore\n - DNA-95278 Existing Pinboards might be missing\n - DNA-95292 Enable #bookmarks-trash-cleaner on all streams\n - DNA-95293 Enable #easy-files-downloads-folder on all streams\n - DNA-95383 Promote O79 to stable\n- Complete Opera 79.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-79/ \n- The update to chromium 93.0.4577.58 fixes following issues:\n CVE-2021-30606, CVE-2021-30607, CVE-2021-30608, CVE-2021-30609,\n CVE-2021-30610, CVE-2021-30611, CVE-2021-30612, CVE-2021-30613,\n CVE-2021-30614, CVE-2021-30615, CVE-2021-30616, CVE-2021-30617,\n CVE-2021-30618, CVE-2021-30619, CVE-2021-30620, CVE-2021-30621,\n CVE-2021-30622, CVE-2021-30623, CVE-2021-30624\n\n- Update to version 78.0.4093.184\n - CHR-8533 Update chromium on desktop-stable-92-4093 to\n 92.0.4515.159\n - DNA-93472 Reattaching to other browsers\n - DNA-93741 Multiple hint slots\n - DNA-93742 Allow displaying unobtrusive external hints\n - DNA-93744 Add slots in toolbar action view\n - DNA-94230 Improve text contrast for Speed Dials\n - DNA-94724 [Mac] Add macOS dark theme wallpaper with easy setup\n - DNA-94786 Crash at base::SupportsUserData::\n SetUserData(void const*, std::__1::unique_ptr)\n - DNA-94807 Allow scripts access opera version and product info\n - DNA-94862 Continue on shopping Amazon doesn\u2019t work correct\n - DNA-94870 Add an addonsPrivate function to install with\n permissions dialog first\n - DNA-95064 Revert DNA-93714 on stable\n- The update to chromium 92.0.4515.159 fixes following issues: \n CVE-2021-30598, CVE-2021-30599, CVE-2021-30600, CVE-2021-30601,\n CVE-2021-30602, CVE-2021-30603, CVE-2021-30604\n \n\n- Update to version 78.0.4093.147\n - CHR-8251 Update chromium on desktop-stable-92-4093\n to 92.0.4515.131\n - DNA-93036 Opera not starting after closing window.\n Processes still working.\n - DNA-94516 Add \u2018Detach tab\u2019 entry to tab menu\n - DNA-94584 [Mac] Sidebar setup not closed after press\n \u2018Add extensions\u2019 button\n - DNA-94761 Crash when trying to record \u201cChrome developer\u201d trace\n - DNA-94790 Crash at opera::VideoConferenceTabDetachController::\n OnBrowserAboutToStartClosing(Browser*)\n- The update to chromium 92.0.4515.131 fixes following issues:\n CVE-2021-30590, CVE-2021-30591, CVE-2021-30592, CVE-2021-30593,\n CVE-2021-30594, CVE-2021-30596, CVE-2021-30597\n\n- Update to version 78.0.4093.112\n - DNA-94466 Implement sorting Pinboards in overview\n - DNA-94582 Add access to APIs for showing pinboard icon in\n sidebar\n - DNA-94603 Suspicious pinboards events\n - DNA-94625 Disable opr.pinboardPrivate.getThumbnail() for\n local files\n - DNA-94640 Promote O78 to stable\n - DNA-94661 Missing translations for some languages\n- Complete Opera 78.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-78/ \n\n- Update to version 77.0.4054.277\n - CHR-8502 Update chromium on desktop-stable-91-4054 to\n 91.0.4472.164\n - DNA-94291 Video conference popout doesnt remember its size\n after resizing\n - DNA-94399 Incorrect icon for wp.pl in address bar dropdown\n - DNA-94462 Low quality of default wallpaper on windows\n- The update to chromium 91.0.4472.164 fixes following issues:\n CVE-2021-30541, CVE-2021-30560, CVE-2021-30561, CVE-2021-30562,\n CVE-2021-30563, CVE-2021-30564\n\n- Update to version 77.0.4054.254\n - DNA-92344 Windows 10 Implementation\n - DNA-92486 Replace \u24e7 icon with \u201csettings\u201d icon\n - DNA-92487 Close individual item\n - DNA-92496 Create separate entry in settings for BABE\n - DNA-93275 Implement cycles size according to design\n - DNA-93280 The system theme has only half a checkmark\n - DNA-93728 Whatsapp notification is not refreshed\n - DNA-94047 Remove pinboard WebUI integration\n - DNA-94118 Write test for ThumbnailTabHelper changes in DNA-94100\n - DNA-94120 Fix Welcome popup layout\n - DNA-94140 Crash at base::TaskRunner\n ::PostTask(base::Location const\u0026, base::OnceCallback)\n - DNA-94205 Consider setting pinboard display URL in\n address_field_helper.cc\n - DNA-94211 Easy Files don\u2019t show thumbnails\n - DNA-94309 Pinboards URLs don\u2019t get lighter color treatment\n - DNA-94318 Wrong \u2018Transparency\u2019 word translation in Swedish\n - DNA-94321 AB test: google suggestions on top \u2013 bigger test\n - DNA-94341 Make pinboard popup testable on web page\n - DNA-94381 Disabling Pinboards doesn\u2019t remove item from\n menu / sidebar\n - DNA-94392 Add u2f-devices interface to snap packages\n - DNA-94461 Enable #system-theme on all streams\n\n- Update to version 77.0.4054.203\n - CHR-8475 Update chromium on desktop-stable-91-4054 to\n 91.0.4472.124\n - DNA-93523 Crash at extensions::TabHelper::WebContentsDestroyed()\n - DNA-93917 Upload snap to edge while preparing repository package\n - DNA-94157 Crash at gfx::ICCProfile::operator=(gfx::ICCProfile const\u0026)\n - DNA-94159 Crash at opera::auth::AuthAccountServiceImpl::GetAuthAccount()\n - DNA-94161 [Add tabs]Unexpected symbols instead of Workspace name\n - DNA-94241 Implement better process killing for timeout\n - DNA-94248 Allow retry on tests that timed-out\n - DNA-94251 heap-use-after-free in VideoConference\n - DNA-94315 Crash at class std::__1::basic_string ui::ResourceBundle::\n LoadLocaleResources(const class std::__1::basic_string\u0026 const, bool)\n - DNA-94357 Fix issue in scripts\n\n- Update to version 77.0.4054.172\n - DNA-93078 Do not display \u2018share tab\u2019 sliding toolbar on\n detached tab\n - DNA-93358 The red underline extends beyond the Google meets\n conference tab outline\n - DNA-93404 Crash in test when destroying BABE\u2019s webcontents\n - DNA-93637 ctrl+9 shortcut is inconsistent with other browsers\n - DNA-93661 Add opauto test to cover new shortcut from DNA-93637\n - DNA-93867 Use version from package instead of repository\n - DNA-93993 Pinboard translations from Master\n - DNA-94099 Increase new-autoupdater-logic AB test to cover\n 50% of new installations\n - DNA-94100 Thumbnail doesn\u2019t update\n - DNA-94178 Automatic popout should not happen after manually\n closing a popout\n\n- Update to version 77.0.4054.146\n - CHR-8458 Update chromium on desktop-stable-91-4054 to\n 91.0.4472.114\n - DNA-92171 Create active linkdiscovery service\n - DNA-92388 Fix and unskip \n WorkspacesEmoji.testChooseEmojiAsWorkspaceIcon when possible\n - DNA-93101 Tabs are being snoozed when tab snoozing is disabled\n - DNA-93386 Update pinboard view when item changes\n - DNA-93448 Make browser ready for Developer release\n - DNA-93491 Fix failing tests after enabling #pinboard flag\n - DNA-93498 Add additional music services\n - DNA-93503 Blank popup on clicking toolbar icon with popup open\n - DNA-93561 Do not allow zoom different from 100% in Pinboard popup\n - DNA-93637 ctrl+9 shortcut is inconsistent with other browsers\n - DNA-93644 Create route for `import open tabs` to `pinboard`\n - DNA-93664 Adapt popup to design\n - DNA-93702 Turn on flags on developer\n - DNA-93737 [Pinboard] Remove Mock API\n - DNA-93745 Unable to open the popup after opening it several times\n - DNA-93776 Popup closes and reopens when clicking the toolbar button\n - DNA-93786 DCHECK after opening popup\n - DNA-93802 Crash at views::Widget::GetNativeView() const\n - DNA-93810 Add pinboard icon to sidebar\n - DNA-93825 Add pinboard to Opera menu\n - DNA-93833 [Player] Implement seeking for new services\n - DNA-93845 Do not log output of snapcraft on console\n - DNA-93864 Create feature flag for start page sync banner\n - DNA-93865 Implement start page banner\n - DNA-93867 Use version from package instead of repository\n - DNA-93878 [Player] Crash when current player service becomes\n unavailable when user location changes\n - DNA-93953 \u2018Send image to Pinboard\u2019 has the wrong position\n in the context menu\n - DNA-93987 Disable zooming popup contents like in other popups\n - DNA-93989 Change internal URL to opera://pinboards\n - DNA-93990 Update strings to reflect new standards\n - DNA-93992 Add Pinboards to Opera settings\n - DNA-93993 Pinboard translations from Master\n - DNA-94011 Enable feature flags for Reborn 5 on stable\n - DNA-94019 Add a direct link to settings\n - DNA-94088 Internal pages provoke not saving other pages to\n the Pinboard\n - DNA-94111 [O77] Sidebar setup does not open\n - DNA-94139 Crash at \n opera::(anonymous namespace)::PinboardPopupWebView::RemovedFromWidget()\n- The update to chromium 91.0.4472.114 fixes following issues:\n CVE-2021-30554, CVE-2021-30555, CVE-2021-30556, CVE-2021-30557\n\n- Update to version 77.0.4054.90\n - CHR-8446 Update chromium on desktop-stable-91-4054 to\n 91.0.4472.101\n- The update to chromium 91.0.4472.101 fixes following issues: \n CVE-2021-30544, CVE-2021-30545, CVE-2021-30546, CVE-2021-30547, \n CVE-2021-30548, CVE-2021-30549, CVE-2021-30550, CVE-2021-30551,\n CVE-2021-30552, CVE-2021-30553\n- Update to version 77.0.4054.80\n - DNA-93656 Active cards in checkout Auto-fill\n - DNA-93805 Create snap packages in buildsign\n - DNA-93823 archive_opera_snap failures on Linux\n - DNA-93844 Fix AttributeError in package_type.py\n \n\n- Update to version 77.0.4054.64\n - DNA-93159 Implement image(preview) of each created pinboard\n - DNA-93273 \u2018Send image to Pinboard\u2019 doesn\u2019t work correct on\n staging server\n - DNA-93277 Add/update opauto tests for the System Theme WP1\n implementation p.1\n - DNA-93286 [BigSur] YT not being reloaded when opened from link\n - DNA-93296 Opera 77 translations\n - DNA-93372 Build new edition for Axel Springer\n - DNA-93376 Write unittests for PinboardImageCollector\n - DNA-93401 [LastCard] Do not change user state if not needed\n - DNA-93409 Animation with hat and glasses is missing in\n Private mode\n - DNA-93443 API opr.pinboardPrivate.getThumbnail() returns\n old thumbnail image\n - DNA-93509 Add Opera switch for pinboard staging backend\n and use it for tests\n - DNA-93519 [Sidebar] WhatsApp \u2018Log out\u2019 doesn\u2019t work\n - DNA-93634 Fix errors in Slovak translations\n - DNA-93724 Some webstore extensions are not verified properly\n- Complete Opera 77.0 changelog at:\n https://blogs.opera.com/desktop/changelog-for-77/\n\n- Update to version 76.0.4017.177\n - DNA-92597 Sound controller doesn\u2019t work after pressing\n \u2018Next\u2019 button\n - DNA-93405 Import vmp_signer instead of starting new python\n process\n - DNA-93406 [Mac] Import plist_util instead of calling script\n in _generateAppEntitlements\n - DNA-93442 Make GX Control panel attachable by webdriver\n - DNA-93554 [AdBlock] Find a fix for blocking \u2018new\u2019 YouTube ads\n - DNA-93587 Pre-refactor solution\n\n- Update to version 76.0.4017.154\n - CHR-8420 Update chromium on desktop-stable-90-4017 to\n 90.0.4430.212\n - DNA-92411 Bookmarks breadcrumbs wrong color when pressed in\n dark mode\n - DNA-92587 Sync settings: \u201cUse old password\u201d button doesn\u2019t work\n - DNA-92672 Make it possible for agent to inject scripts into\n startpage\n - DNA-92712 Add SD reload API\n - DNA-93190 The bookmark can\u2019t be opened in Workspace 5-6\n - DNA-93247 Reopen last closed tab shortcut opens random tab on\n new window\n - DNA-93294 Binary diff for opera_browser.dll is not created on\n 32-bit builds\n - DNA-93313 Add opauto test to cover DNA-93190\n - DNA-93368 Fix an error in Polish translation\n - DNA-93408 [Windows] widevine_cdm_component_installer does not\n compile on desktop-stable-90-4017\n- The update to chromium 90.0.4430.212 fixes following issues: \n CVE-2021-30506, CVE-2021-30507, CVE-2021-30508, CVE-2021-30509,\n CVE-2021-30510, CVE-2021-30511, CVE-2021-30512, CVE-2021-30513,\n CVE-2021-30514, CVE-2021-30515, CVE-2021-30516, CVE-2021-30517,\n CVE-2021-30518, CVE-2021-30519, CVE-2021-30520\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-110",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0110-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0110-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0110-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZOJPFVCOKYO6YUMKBJPTCF74IGAYK5K4/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30506 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30507 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30507/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30508 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30508/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30509 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30509/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30510 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30510/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30511 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30511/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30512 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30512/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30513 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30513/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30514 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30514/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30515 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30515/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30516 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30516/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30517 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30517/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30518 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30518/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30519 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30519/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30520 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30520/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30541 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30541/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30544 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30544/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30545 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30546 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30546/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30547 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30547/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30548 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30548/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30549 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30549/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30550 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30550/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30551 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30551/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30552 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30552/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30553 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30553/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30554 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30554/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30555 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30555/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30556 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30556/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30557 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30557/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30560 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30560/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30561 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30561/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30562 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30562/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30563 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30563/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30564 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30564/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30590 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30590/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30591 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30591/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30592 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30592/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30593 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30593/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30594 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30594/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30596 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30596/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30597 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30597/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30598 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30598/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30599 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30599/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30600 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30600/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30601 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30601/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30602 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30602/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30603 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30604 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30606 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30607 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30608 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30609 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30610 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30611 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30611/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30612 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30612/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30613 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30613/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30614 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30614/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30615 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30615/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30616 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30616/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30617 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30617/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30618 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30619 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30619/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30620 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30620/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30621 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30622 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30622/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30623 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30623/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30624 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30624/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30625 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30626 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30626/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30627 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30627/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30628 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30628/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30629 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30629/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30630 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30630/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30631 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30631/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30632 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30632/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-30633 page",
"url": "https://www.suse.com/security/cve/CVE-2021-30633/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37974 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37974/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37975 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37975/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37976 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37976/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37977 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37977/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37978 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37978/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37979 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37979/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37980 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37980/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37981 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37981/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37982 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37982/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37983 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37983/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37984 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37984/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37985 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37985/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37986 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37986/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37987 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37987/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37988 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37988/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37989 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37989/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37990 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37990/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37991 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37991/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37992 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37992/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37993 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37993/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37994 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37994/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37995 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37995/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37996 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37996/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37997 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37997/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37998 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37998/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-37999 page",
"url": "https://www.suse.com/security/cve/CVE-2021-37999/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38001 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38001/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38002 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38002/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38003 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38003/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38004 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38004/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38005 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38005/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38006 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38007 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38007/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38008 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38008/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38009 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38009/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38010 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38010/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38011 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38011/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38012 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38012/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38013 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38013/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38014 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38014/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38015 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38015/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38016 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38016/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38017 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38017/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38019 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38019/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38020 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38020/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38021 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-38022 page",
"url": "https://www.suse.com/security/cve/CVE-2021-38022/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4052 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4052/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4053 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4053/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4054 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4054/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4055 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4055/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4056 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4056/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4057 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4057/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4058 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4058/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4059 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4059/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4061 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4061/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4062 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4062/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4063 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4064 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4064/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4065 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4065/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4066 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4067 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4068 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4078 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4079 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4098 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4099 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4100 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4101 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-4102 page",
"url": "https://www.suse.com/security/cve/CVE-2021-4102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0096 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0096/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0097 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0097/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0098 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0098/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0099 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0099/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0100 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0100/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0101 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0102 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0103 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0103/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0104 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0104/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0105 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0105/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0106 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0106/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0107 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0107/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0108 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0108/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0109 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0109/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0110 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0110/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0111 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0111/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0112 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0112/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0113 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0113/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0114 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0114/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0115 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0115/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0116 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0116/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0117 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0117/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0118 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0118/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0120 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0120/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0289 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0290 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0291 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0292 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0292/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0293 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0294 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0294/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0295 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0295/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0296 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0296/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0297 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0297/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0298 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0298/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0300 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0300/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0301 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0301/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0302 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0302/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0304 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0304/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0305 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0305/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0306 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0306/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0307 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0307/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0308 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0308/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0309 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0309/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0310 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0310/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0311 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0311/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0452 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0452/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0453 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0453/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0454 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0454/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0455 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0455/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0456 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0456/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0457 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0457/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0458 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0458/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0459 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0459/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0460 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0460/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0461 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0461/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0462 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0462/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0463 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0463/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0464 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0464/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0465 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0465/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0466 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0466/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0467 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0467/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0468 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0468/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0469 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0469/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0470 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0470/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0603 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0603/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0604 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0604/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0605 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0605/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0606 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0606/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0607 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0607/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0608 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0608/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0609 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0609/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0610 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0610/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0789 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0790 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0790/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0791 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0792 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0793 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0794 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0795 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0796 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0797 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0797/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0798 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0798/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0799 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0799/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0800 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0800/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0801 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0801/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0802 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0802/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0803 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0803/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0804 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0804/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0805 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0805/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0806 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0807 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0807/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0808 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0808/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-0809 page",
"url": "https://www.suse.com/security/cve/CVE-2022-0809/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1096 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1096/"
}
],
"title": "Security update for opera",
"tracking": {
"current_release_date": "2022-04-08T14:01:17Z",
"generator": {
"date": "2022-04-08T14:01:17Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0110-1",
"initial_release_date": "2022-04-08T14:01:17Z",
"revision_history": [
{
"date": "2022-04-08T14:01:17Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "opera-85.0.4341.28-lp154.2.5.1.x86_64",
"product": {
"name": "opera-85.0.4341.28-lp154.2.5.1.x86_64",
"product_id": "opera-85.0.4341.28-lp154.2.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.4 NonFree",
"product": {
"name": "openSUSE Leap 15.4 NonFree",
"product_id": "openSUSE Leap 15.4 NonFree",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "opera-85.0.4341.28-lp154.2.5.1.x86_64 as component of openSUSE Leap 15.4 NonFree",
"product_id": "openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
},
"product_reference": "opera-85.0.4341.28-lp154.2.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4 NonFree"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-30506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30506"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Web App Installs in Google Chrome on Android prior to 90.0.4430.212 allowed an attacker who convinced a user to install a web application to inject scripts or HTML into a privileged page via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30506",
"url": "https://www.suse.com/security/cve/CVE-2021-30506"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30506",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30506"
},
{
"cve": "CVE-2021-30507",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30507"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Offline in Google Chrome on Android prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30507",
"url": "https://www.suse.com/security/cve/CVE-2021-30507"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30507",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30507"
},
{
"cve": "CVE-2021-30508",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30508"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Media Feeds in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to enable certain features in Chrome to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30508",
"url": "https://www.suse.com/security/cve/CVE-2021-30508"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30508",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30508"
},
{
"cve": "CVE-2021-30509",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30509"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page and a crafted Chrome extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30509",
"url": "https://www.suse.com/security/cve/CVE-2021-30509"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30509",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30509"
},
{
"cve": "CVE-2021-30510",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30510"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Aura in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30510",
"url": "https://www.suse.com/security/cve/CVE-2021-30510"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30510",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30510"
},
{
"cve": "CVE-2021-30511",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30511"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Tab Groups in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30511",
"url": "https://www.suse.com/security/cve/CVE-2021-30511"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30511",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30511"
},
{
"cve": "CVE-2021-30512",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30512"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Notifications in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30512",
"url": "https://www.suse.com/security/cve/CVE-2021-30512"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30512",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30512"
},
{
"cve": "CVE-2021-30513",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30513"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30513",
"url": "https://www.suse.com/security/cve/CVE-2021-30513"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30513",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30513"
},
{
"cve": "CVE-2021-30514",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30514"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Autofill in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30514",
"url": "https://www.suse.com/security/cve/CVE-2021-30514"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30514",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30514"
},
{
"cve": "CVE-2021-30515",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30515"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in File API in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30515",
"url": "https://www.suse.com/security/cve/CVE-2021-30515"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30515",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30515"
},
{
"cve": "CVE-2021-30516",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30516"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in History in Google Chrome prior to 90.0.4430.212 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30516",
"url": "https://www.suse.com/security/cve/CVE-2021-30516"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30516",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30516"
},
{
"cve": "CVE-2021-30517",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30517"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30517",
"url": "https://www.suse.com/security/cve/CVE-2021-30517"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30517",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30517"
},
{
"cve": "CVE-2021-30518",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30518"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Reader Mode in Google Chrome prior to 90.0.4430.212 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30518",
"url": "https://www.suse.com/security/cve/CVE-2021-30518"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30518",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30518"
},
{
"cve": "CVE-2021-30519",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30519"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Payments in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious payments app to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30519",
"url": "https://www.suse.com/security/cve/CVE-2021-30519"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30519",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30519"
},
{
"cve": "CVE-2021-30520",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30520"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Tab Strip in Google Chrome prior to 90.0.4430.212 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30520",
"url": "https://www.suse.com/security/cve/CVE-2021-30520"
},
{
"category": "external",
"summary": "SUSE Bug 1185908 for CVE-2021-30520",
"url": "https://bugzilla.suse.com/1185908"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30520"
},
{
"cve": "CVE-2021-30541",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30541"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30541",
"url": "https://www.suse.com/security/cve/CVE-2021-30541"
},
{
"category": "external",
"summary": "SUSE Bug 1188373 for CVE-2021-30541",
"url": "https://bugzilla.suse.com/1188373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30541"
},
{
"cve": "CVE-2021-30544",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30544"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in BFCache in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30544",
"url": "https://www.suse.com/security/cve/CVE-2021-30544"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30544",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30544"
},
{
"cve": "CVE-2021-30545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30545"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30545",
"url": "https://www.suse.com/security/cve/CVE-2021-30545"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30545",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30545"
},
{
"cve": "CVE-2021-30546",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30546"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Autofill in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30546",
"url": "https://www.suse.com/security/cve/CVE-2021-30546"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30546",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30546"
},
{
"cve": "CVE-2021-30547",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30547"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in ANGLE in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30547",
"url": "https://www.suse.com/security/cve/CVE-2021-30547"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30547",
"url": "https://bugzilla.suse.com/1187141"
},
{
"category": "external",
"summary": "SUSE Bug 1188275 for CVE-2021-30547",
"url": "https://bugzilla.suse.com/1188275"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30547"
},
{
"cve": "CVE-2021-30548",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30548"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Loader in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30548",
"url": "https://www.suse.com/security/cve/CVE-2021-30548"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30548",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30548"
},
{
"cve": "CVE-2021-30549",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30549"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Spell check in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30549",
"url": "https://www.suse.com/security/cve/CVE-2021-30549"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30549",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30549"
},
{
"cve": "CVE-2021-30550",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30550"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Accessibility in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30550",
"url": "https://www.suse.com/security/cve/CVE-2021-30550"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30550",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30550"
},
{
"cve": "CVE-2021-30551",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30551"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30551",
"url": "https://www.suse.com/security/cve/CVE-2021-30551"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30551",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30551"
},
{
"cve": "CVE-2021-30552",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30552"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions in Google Chrome prior to 91.0.4472.101 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30552",
"url": "https://www.suse.com/security/cve/CVE-2021-30552"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30552",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30552"
},
{
"cve": "CVE-2021-30553",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30553"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Network service in Google Chrome prior to 91.0.4472.101 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30553",
"url": "https://www.suse.com/security/cve/CVE-2021-30553"
},
{
"category": "external",
"summary": "SUSE Bug 1187141 for CVE-2021-30553",
"url": "https://bugzilla.suse.com/1187141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30553"
},
{
"cve": "CVE-2021-30554",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30554"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebGL in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30554",
"url": "https://www.suse.com/security/cve/CVE-2021-30554"
},
{
"category": "external",
"summary": "SUSE Bug 1187481 for CVE-2021-30554",
"url": "https://bugzilla.suse.com/1187481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30554"
},
{
"cve": "CVE-2021-30555",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30555"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Sharing in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page and user gesture.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30555",
"url": "https://www.suse.com/security/cve/CVE-2021-30555"
},
{
"category": "external",
"summary": "SUSE Bug 1187481 for CVE-2021-30555",
"url": "https://bugzilla.suse.com/1187481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30555"
},
{
"cve": "CVE-2021-30556",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30556"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebAudio in Google Chrome prior to 91.0.4472.114 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30556",
"url": "https://www.suse.com/security/cve/CVE-2021-30556"
},
{
"category": "external",
"summary": "SUSE Bug 1187481 for CVE-2021-30556",
"url": "https://bugzilla.suse.com/1187481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30556"
},
{
"cve": "CVE-2021-30557",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30557"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in TabGroups in Google Chrome prior to 91.0.4472.114 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30557",
"url": "https://www.suse.com/security/cve/CVE-2021-30557"
},
{
"category": "external",
"summary": "SUSE Bug 1187481 for CVE-2021-30557",
"url": "https://bugzilla.suse.com/1187481"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30557"
},
{
"cve": "CVE-2021-30560",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30560"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Blink XSLT in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30560",
"url": "https://www.suse.com/security/cve/CVE-2021-30560"
},
{
"category": "external",
"summary": "SUSE Bug 1188373 for CVE-2021-30560",
"url": "https://bugzilla.suse.com/1188373"
},
{
"category": "external",
"summary": "SUSE Bug 1208574 for CVE-2021-30560",
"url": "https://bugzilla.suse.com/1208574"
},
{
"category": "external",
"summary": "SUSE Bug 1211500 for CVE-2021-30560",
"url": "https://bugzilla.suse.com/1211500"
},
{
"category": "external",
"summary": "SUSE Bug 1211501 for CVE-2021-30560",
"url": "https://bugzilla.suse.com/1211501"
},
{
"category": "external",
"summary": "SUSE Bug 1211544 for CVE-2021-30560",
"url": "https://bugzilla.suse.com/1211544"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30560"
},
{
"cve": "CVE-2021-30561",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30561"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30561",
"url": "https://www.suse.com/security/cve/CVE-2021-30561"
},
{
"category": "external",
"summary": "SUSE Bug 1188373 for CVE-2021-30561",
"url": "https://bugzilla.suse.com/1188373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30561"
},
{
"cve": "CVE-2021-30562",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30562"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebSerial in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30562",
"url": "https://www.suse.com/security/cve/CVE-2021-30562"
},
{
"category": "external",
"summary": "SUSE Bug 1188373 for CVE-2021-30562",
"url": "https://bugzilla.suse.com/1188373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30562"
},
{
"cve": "CVE-2021-30563",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30563"
}
],
"notes": [
{
"category": "general",
"text": "Type Confusion in V8 in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30563",
"url": "https://www.suse.com/security/cve/CVE-2021-30563"
},
{
"category": "external",
"summary": "SUSE Bug 1188373 for CVE-2021-30563",
"url": "https://bugzilla.suse.com/1188373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30563"
},
{
"cve": "CVE-2021-30564",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30564"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in WebXR in Google Chrome prior to 91.0.4472.164 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30564",
"url": "https://www.suse.com/security/cve/CVE-2021-30564"
},
{
"category": "external",
"summary": "SUSE Bug 1188373 for CVE-2021-30564",
"url": "https://bugzilla.suse.com/1188373"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-30564"
},
{
"cve": "CVE-2021-30590",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30590"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Bookmarks in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30590",
"url": "https://www.suse.com/security/cve/CVE-2021-30590"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30590",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30590"
},
{
"cve": "CVE-2021-30591",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30591"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in File System API in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30591",
"url": "https://www.suse.com/security/cve/CVE-2021-30591"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30591",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30591"
},
{
"cve": "CVE-2021-30592",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30592"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in Tab Groups in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory write via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30592",
"url": "https://www.suse.com/security/cve/CVE-2021-30592"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30592",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30592"
},
{
"cve": "CVE-2021-30593",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30593"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in Tab Strip in Google Chrome prior to 92.0.4515.131 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30593",
"url": "https://www.suse.com/security/cve/CVE-2021-30593"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30593",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30593"
},
{
"cve": "CVE-2021-30594",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30594"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Page Info UI in Google Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30594",
"url": "https://www.suse.com/security/cve/CVE-2021-30594"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30594",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30594"
},
{
"cve": "CVE-2021-30596",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30596"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Navigation in Google Chrome on Android prior to 92.0.4515.131 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30596",
"url": "https://www.suse.com/security/cve/CVE-2021-30596"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30596",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30596"
},
{
"cve": "CVE-2021-30597",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30597"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Browser UI in Google Chrome on Chrome prior to 92.0.4515.131 allowed a remote attacker to potentially exploit heap corruption via physical access to the device.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30597",
"url": "https://www.suse.com/security/cve/CVE-2021-30597"
},
{
"category": "external",
"summary": "SUSE Bug 1189006 for CVE-2021-30597",
"url": "https://bugzilla.suse.com/1189006"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30597"
},
{
"cve": "CVE-2021-30598",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30598"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30598",
"url": "https://www.suse.com/security/cve/CVE-2021-30598"
},
{
"category": "external",
"summary": "SUSE Bug 1189490 for CVE-2021-30598",
"url": "https://bugzilla.suse.com/1189490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30598"
},
{
"cve": "CVE-2021-30599",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30599"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30599",
"url": "https://www.suse.com/security/cve/CVE-2021-30599"
},
{
"category": "external",
"summary": "SUSE Bug 1189490 for CVE-2021-30599",
"url": "https://bugzilla.suse.com/1189490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30599"
},
{
"cve": "CVE-2021-30600",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30600"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Printing in Google Chrome prior to 92.0.4515.159 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30600",
"url": "https://www.suse.com/security/cve/CVE-2021-30600"
},
{
"category": "external",
"summary": "SUSE Bug 1189490 for CVE-2021-30600",
"url": "https://bugzilla.suse.com/1189490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30600"
},
{
"cve": "CVE-2021-30601",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30601"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30601",
"url": "https://www.suse.com/security/cve/CVE-2021-30601"
},
{
"category": "external",
"summary": "SUSE Bug 1189490 for CVE-2021-30601",
"url": "https://bugzilla.suse.com/1189490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30601"
},
{
"cve": "CVE-2021-30602",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30602"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30602",
"url": "https://www.suse.com/security/cve/CVE-2021-30602"
},
{
"category": "external",
"summary": "SUSE Bug 1189490 for CVE-2021-30602",
"url": "https://bugzilla.suse.com/1189490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30602"
},
{
"cve": "CVE-2021-30603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30603"
}
],
"notes": [
{
"category": "general",
"text": "Data race in WebAudio in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30603",
"url": "https://www.suse.com/security/cve/CVE-2021-30603"
},
{
"category": "external",
"summary": "SUSE Bug 1189490 for CVE-2021-30603",
"url": "https://bugzilla.suse.com/1189490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30603"
},
{
"cve": "CVE-2021-30604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30604"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30604",
"url": "https://www.suse.com/security/cve/CVE-2021-30604"
},
{
"category": "external",
"summary": "SUSE Bug 1189490 for CVE-2021-30604",
"url": "https://bugzilla.suse.com/1189490"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30604"
},
{
"cve": "CVE-2021-30606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30606"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30606 Use after free in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30606",
"url": "https://www.suse.com/security/cve/CVE-2021-30606"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30606",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30606"
},
{
"cve": "CVE-2021-30607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30607"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30607 Use after free in Permissions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30607",
"url": "https://www.suse.com/security/cve/CVE-2021-30607"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30607",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30607"
},
{
"cve": "CVE-2021-30608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30608"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30608 Use after free in Web Share",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30608",
"url": "https://www.suse.com/security/cve/CVE-2021-30608"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30608",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30608"
},
{
"cve": "CVE-2021-30609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30609"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30609 Use after free in Sign-In",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30609",
"url": "https://www.suse.com/security/cve/CVE-2021-30609"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30609",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30609"
},
{
"cve": "CVE-2021-30610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30610"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30610 Use after free in Extensions API",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30610",
"url": "https://www.suse.com/security/cve/CVE-2021-30610"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30610",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30610"
},
{
"cve": "CVE-2021-30611",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30611"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30611 Use after free in WebRTC",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30611",
"url": "https://www.suse.com/security/cve/CVE-2021-30611"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30611",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30611"
},
{
"cve": "CVE-2021-30612",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30612"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30612 Use after free in WebRTC",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30612",
"url": "https://www.suse.com/security/cve/CVE-2021-30612"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30612",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30612"
},
{
"cve": "CVE-2021-30613",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30613"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30613 Use after free in Base internals",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30613",
"url": "https://www.suse.com/security/cve/CVE-2021-30613"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30613",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30613"
},
{
"cve": "CVE-2021-30614",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30614"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30614",
"url": "https://www.suse.com/security/cve/CVE-2021-30614"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30614",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30614"
},
{
"cve": "CVE-2021-30615",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30615"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30615 Cross-origin data leak in Navigation",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30615",
"url": "https://www.suse.com/security/cve/CVE-2021-30615"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30615",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30615"
},
{
"cve": "CVE-2021-30616",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30616"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30616 Use after free in Media",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30616",
"url": "https://www.suse.com/security/cve/CVE-2021-30616"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30616",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30616"
},
{
"cve": "CVE-2021-30617",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30617"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30617 Policy bypass in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30617",
"url": "https://www.suse.com/security/cve/CVE-2021-30617"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30617",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30617"
},
{
"cve": "CVE-2021-30618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30618"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30618 Inappropriate implementation in DevTools",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30618",
"url": "https://www.suse.com/security/cve/CVE-2021-30618"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30618",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30618"
},
{
"cve": "CVE-2021-30619",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30619"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30619 UI Spoofing in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30619",
"url": "https://www.suse.com/security/cve/CVE-2021-30619"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30619",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30619"
},
{
"cve": "CVE-2021-30620",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30620"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30620",
"url": "https://www.suse.com/security/cve/CVE-2021-30620"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30620",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30620"
},
{
"cve": "CVE-2021-30621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30621"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30621 UI Spoofing in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30621",
"url": "https://www.suse.com/security/cve/CVE-2021-30621"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30621",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30621"
},
{
"cve": "CVE-2021-30622",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30622"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30622 Use after free in WebApp Installs",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30622",
"url": "https://www.suse.com/security/cve/CVE-2021-30622"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30622",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30622"
},
{
"cve": "CVE-2021-30623",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30623"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30623 Use after free in Bookmarks",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30623",
"url": "https://www.suse.com/security/cve/CVE-2021-30623"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30623",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30623"
},
{
"cve": "CVE-2021-30624",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30624"
}
],
"notes": [
{
"category": "general",
"text": "Chromium: CVE-2021-30624 Use after free in Autofill",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30624",
"url": "https://www.suse.com/security/cve/CVE-2021-30624"
},
{
"category": "external",
"summary": "SUSE Bug 1190096 for CVE-2021-30624",
"url": "https://bugzilla.suse.com/1190096"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-30624"
},
{
"cve": "CVE-2021-30625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30625"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30625",
"url": "https://www.suse.com/security/cve/CVE-2021-30625"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30625",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30625"
},
{
"cve": "CVE-2021-30626",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30626"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30626",
"url": "https://www.suse.com/security/cve/CVE-2021-30626"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30626",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30626"
},
{
"cve": "CVE-2021-30627",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30627"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30627",
"url": "https://www.suse.com/security/cve/CVE-2021-30627"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30627",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30627"
},
{
"cve": "CVE-2021-30628",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30628"
}
],
"notes": [
{
"category": "general",
"text": "Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30628",
"url": "https://www.suse.com/security/cve/CVE-2021-30628"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30628",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30628"
},
{
"cve": "CVE-2021-30629",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30629"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30629",
"url": "https://www.suse.com/security/cve/CVE-2021-30629"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30629",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30629"
},
{
"cve": "CVE-2021-30630",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30630"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30630",
"url": "https://www.suse.com/security/cve/CVE-2021-30630"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30630",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30630"
},
{
"cve": "CVE-2021-30631",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30631"
}
],
"notes": [
{
"category": "general",
"text": "DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30631",
"url": "https://www.suse.com/security/cve/CVE-2021-30631"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30631",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30631"
},
{
"cve": "CVE-2021-30632",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30632"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30632",
"url": "https://www.suse.com/security/cve/CVE-2021-30632"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30632",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30632"
},
{
"cve": "CVE-2021-30633",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-30633"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-30633",
"url": "https://www.suse.com/security/cve/CVE-2021-30633"
},
{
"category": "external",
"summary": "SUSE Bug 1190476 for CVE-2021-30633",
"url": "https://bugzilla.suse.com/1190476"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-30633"
},
{
"cve": "CVE-2021-37974",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37974"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Safebrowsing in Google Chrome prior to 94.0.4606.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37974",
"url": "https://www.suse.com/security/cve/CVE-2021-37974"
},
{
"category": "external",
"summary": "SUSE Bug 1191204 for CVE-2021-37974",
"url": "https://bugzilla.suse.com/1191204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-37974"
},
{
"cve": "CVE-2021-37975",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37975"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37975",
"url": "https://www.suse.com/security/cve/CVE-2021-37975"
},
{
"category": "external",
"summary": "SUSE Bug 1191204 for CVE-2021-37975",
"url": "https://bugzilla.suse.com/1191204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-37975"
},
{
"cve": "CVE-2021-37976",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37976"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37976",
"url": "https://www.suse.com/security/cve/CVE-2021-37976"
},
{
"category": "external",
"summary": "SUSE Bug 1191204 for CVE-2021-37976",
"url": "https://bugzilla.suse.com/1191204"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-37976"
},
{
"cve": "CVE-2021-37977",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37977"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Garbage Collection in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37977",
"url": "https://www.suse.com/security/cve/CVE-2021-37977"
},
{
"category": "external",
"summary": "SUSE Bug 1191463 for CVE-2021-37977",
"url": "https://bugzilla.suse.com/1191463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37977"
},
{
"cve": "CVE-2021-37978",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37978"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Blink in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37978",
"url": "https://www.suse.com/security/cve/CVE-2021-37978"
},
{
"category": "external",
"summary": "SUSE Bug 1191463 for CVE-2021-37978",
"url": "https://bugzilla.suse.com/1191463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37978"
},
{
"cve": "CVE-2021-37979",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37979"
}
],
"notes": [
{
"category": "general",
"text": "heap buffer overflow in WebRTC in Google Chrome prior to 94.0.4606.81 allowed a remote attacker who convinced a user to browse to a malicious website to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37979",
"url": "https://www.suse.com/security/cve/CVE-2021-37979"
},
{
"category": "external",
"summary": "SUSE Bug 1191463 for CVE-2021-37979",
"url": "https://bugzilla.suse.com/1191463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37979"
},
{
"cve": "CVE-2021-37980",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37980"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Sandbox in Google Chrome prior to 94.0.4606.81 allowed a remote attacker to potentially bypass site isolation via Windows.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37980",
"url": "https://www.suse.com/security/cve/CVE-2021-37980"
},
{
"category": "external",
"summary": "SUSE Bug 1191463 for CVE-2021-37980",
"url": "https://bugzilla.suse.com/1191463"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37980"
},
{
"cve": "CVE-2021-37981",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37981"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Skia in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37981",
"url": "https://www.suse.com/security/cve/CVE-2021-37981"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37981",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37981"
},
{
"cve": "CVE-2021-37982",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37982"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Incognito in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37982",
"url": "https://www.suse.com/security/cve/CVE-2021-37982"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37982",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37982"
},
{
"cve": "CVE-2021-37983",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37983"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Dev Tools in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37983",
"url": "https://www.suse.com/security/cve/CVE-2021-37983"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37983",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37983"
},
{
"cve": "CVE-2021-37984",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37984"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in PDFium in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37984",
"url": "https://www.suse.com/security/cve/CVE-2021-37984"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37984",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37984"
},
{
"cve": "CVE-2021-37985",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37985"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who had convinced a user to allow for connection to debugger to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37985",
"url": "https://www.suse.com/security/cve/CVE-2021-37985"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37985",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37985"
},
{
"cve": "CVE-2021-37986",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37986"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Settings in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to engage with Dev Tools to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37986",
"url": "https://www.suse.com/security/cve/CVE-2021-37986"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37986",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37986"
},
{
"cve": "CVE-2021-37987",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37987"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Network APIs in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37987",
"url": "https://www.suse.com/security/cve/CVE-2021-37987"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37987",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37987"
},
{
"cve": "CVE-2021-37988",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37988"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Profiles in Google Chrome prior to 95.0.4638.54 allowed a remote attacker who convinced a user to engage in specific gestures to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37988",
"url": "https://www.suse.com/security/cve/CVE-2021-37988"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37988",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37988"
},
{
"cve": "CVE-2021-37989",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37989"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to abuse content security policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37989",
"url": "https://www.suse.com/security/cve/CVE-2021-37989"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37989",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37989"
},
{
"cve": "CVE-2021-37990",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37990"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in WebView in Google Chrome on Android prior to 95.0.4638.54 allowed a remote attacker to leak cross-origin data via a crafted app.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37990",
"url": "https://www.suse.com/security/cve/CVE-2021-37990"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37990",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37990"
},
{
"cve": "CVE-2021-37991",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37991"
}
],
"notes": [
{
"category": "general",
"text": "Race in V8 in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37991",
"url": "https://www.suse.com/security/cve/CVE-2021-37991"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37991",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37991"
},
{
"cve": "CVE-2021-37992",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37992"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in WebAudio in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37992",
"url": "https://www.suse.com/security/cve/CVE-2021-37992"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37992",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37992"
},
{
"cve": "CVE-2021-37993",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37993"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PDF Accessibility in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37993",
"url": "https://www.suse.com/security/cve/CVE-2021-37993"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37993",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37993"
},
{
"cve": "CVE-2021-37994",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37994"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in iFrame Sandbox in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37994",
"url": "https://www.suse.com/security/cve/CVE-2021-37994"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37994",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37994"
},
{
"cve": "CVE-2021-37995",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37995"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in WebApp Installer in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to potentially overlay and spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37995",
"url": "https://www.suse.com/security/cve/CVE-2021-37995"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37995",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37995"
},
{
"cve": "CVE-2021-37996",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37996"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient validation of untrusted input Downloads in Google Chrome prior to 95.0.4638.54 allowed a remote attacker to bypass navigation restrictions via a malicious file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37996",
"url": "https://www.suse.com/security/cve/CVE-2021-37996"
},
{
"category": "external",
"summary": "SUSE Bug 1191844 for CVE-2021-37996",
"url": "https://bugzilla.suse.com/1191844"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-37996"
},
{
"cve": "CVE-2021-37997",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37997"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Sign-In in Google Chrome prior to 95.0.4638.69 allowed a remote attacker who convinced a user to sign into Chrome to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37997",
"url": "https://www.suse.com/security/cve/CVE-2021-37997"
},
{
"category": "external",
"summary": "SUSE Bug 1192184 for CVE-2021-37997",
"url": "https://bugzilla.suse.com/1192184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-37997"
},
{
"cve": "CVE-2021-37998",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37998"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Garbage Collection in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37998",
"url": "https://www.suse.com/security/cve/CVE-2021-37998"
},
{
"category": "external",
"summary": "SUSE Bug 1192184 for CVE-2021-37998",
"url": "https://bugzilla.suse.com/1192184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-37998"
},
{
"cve": "CVE-2021-37999",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-37999"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in New Tab Page in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to inject arbitrary scripts or HTML in a new browser tab via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-37999",
"url": "https://www.suse.com/security/cve/CVE-2021-37999"
},
{
"category": "external",
"summary": "SUSE Bug 1192184 for CVE-2021-37999",
"url": "https://bugzilla.suse.com/1192184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-37999"
},
{
"cve": "CVE-2021-38001",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38001"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38001",
"url": "https://www.suse.com/security/cve/CVE-2021-38001"
},
{
"category": "external",
"summary": "SUSE Bug 1192184 for CVE-2021-38001",
"url": "https://bugzilla.suse.com/1192184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38001"
},
{
"cve": "CVE-2021-38002",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38002"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Web Transport in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38002",
"url": "https://www.suse.com/security/cve/CVE-2021-38002"
},
{
"category": "external",
"summary": "SUSE Bug 1192184 for CVE-2021-38002",
"url": "https://bugzilla.suse.com/1192184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38002"
},
{
"cve": "CVE-2021-38003",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38003"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in V8 in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38003",
"url": "https://www.suse.com/security/cve/CVE-2021-38003"
},
{
"category": "external",
"summary": "SUSE Bug 1192184 for CVE-2021-38003",
"url": "https://bugzilla.suse.com/1192184"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38003"
},
{
"cve": "CVE-2021-38004",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38004"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Autofill in Google Chrome prior to 95.0.4638.69 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38004",
"url": "https://www.suse.com/security/cve/CVE-2021-38004"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "moderate"
}
],
"title": "CVE-2021-38004"
},
{
"cve": "CVE-2021-38005",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38005"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in loader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38005",
"url": "https://www.suse.com/security/cve/CVE-2021-38005"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38005",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38005"
},
{
"cve": "CVE-2021-38006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38006"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38006",
"url": "https://www.suse.com/security/cve/CVE-2021-38006"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38006",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38006"
},
{
"cve": "CVE-2021-38007",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38007"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38007",
"url": "https://www.suse.com/security/cve/CVE-2021-38007"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38007",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38007"
},
{
"cve": "CVE-2021-38008",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38008"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in media in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38008",
"url": "https://www.suse.com/security/cve/CVE-2021-38008"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38008",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38008"
},
{
"cve": "CVE-2021-38009",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38009"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in cache in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38009",
"url": "https://www.suse.com/security/cve/CVE-2021-38009"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38009",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38009"
},
{
"cve": "CVE-2021-38010",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38010"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in service workers in Google Chrome prior to 96.0.4664.45 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38010",
"url": "https://www.suse.com/security/cve/CVE-2021-38010"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38010",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38010"
},
{
"cve": "CVE-2021-38011",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38011"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in storage foundation in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38011",
"url": "https://www.suse.com/security/cve/CVE-2021-38011"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38011",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38011"
},
{
"cve": "CVE-2021-38012",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38012"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38012",
"url": "https://www.suse.com/security/cve/CVE-2021-38012"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38012",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38012"
},
{
"cve": "CVE-2021-38013",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38013"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in fingerprint recognition in Google Chrome on ChromeOS prior to 96.0.4664.45 allowed a remote attacker who had compromised a WebUI renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38013",
"url": "https://www.suse.com/security/cve/CVE-2021-38013"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38013",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38013"
},
{
"cve": "CVE-2021-38014",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38014"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in Swiftshader in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38014",
"url": "https://www.suse.com/security/cve/CVE-2021-38014"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38014",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38014"
},
{
"cve": "CVE-2021-38015",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38015"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in input in Google Chrome prior to 96.0.4664.45 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38015",
"url": "https://www.suse.com/security/cve/CVE-2021-38015"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38015",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38015"
},
{
"cve": "CVE-2021-38016",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38016"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in background fetch in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass same origin policy via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38016",
"url": "https://www.suse.com/security/cve/CVE-2021-38016"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38016",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38016"
},
{
"cve": "CVE-2021-38017",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38017"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in iframe sandbox in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38017",
"url": "https://www.suse.com/security/cve/CVE-2021-38017"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38017",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38017"
},
{
"cve": "CVE-2021-38019",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38019"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in CORS in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38019",
"url": "https://www.suse.com/security/cve/CVE-2021-38019"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38019",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38019"
},
{
"cve": "CVE-2021-38020",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38020"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in contacts picker in Google Chrome on Android prior to 96.0.4664.45 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38020",
"url": "https://www.suse.com/security/cve/CVE-2021-38020"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38020",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38020"
},
{
"cve": "CVE-2021-38021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38021"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in referrer in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38021",
"url": "https://www.suse.com/security/cve/CVE-2021-38021"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38021",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38021"
},
{
"cve": "CVE-2021-38022",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-38022"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in WebAuthentication in Google Chrome prior to 96.0.4664.45 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-38022",
"url": "https://www.suse.com/security/cve/CVE-2021-38022"
},
{
"category": "external",
"summary": "SUSE Bug 1192734 for CVE-2021-38022",
"url": "https://bugzilla.suse.com/1192734"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2021-38022"
},
{
"cve": "CVE-2021-4052",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4052"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4052",
"url": "https://www.suse.com/security/cve/CVE-2021-4052"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4052",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4052"
},
{
"cve": "CVE-2021-4053",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4053"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4053",
"url": "https://www.suse.com/security/cve/CVE-2021-4053"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4053",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4053"
},
{
"cve": "CVE-2021-4054",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4054"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4054",
"url": "https://www.suse.com/security/cve/CVE-2021-4054"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4054",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4054"
},
{
"cve": "CVE-2021-4055",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4055"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4055",
"url": "https://www.suse.com/security/cve/CVE-2021-4055"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4055",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4055"
},
{
"cve": "CVE-2021-4056",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4056"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4056",
"url": "https://www.suse.com/security/cve/CVE-2021-4056"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4056",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4056"
},
{
"cve": "CVE-2021-4057",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4057"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4057",
"url": "https://www.suse.com/security/cve/CVE-2021-4057"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4057",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4057"
},
{
"cve": "CVE-2021-4058",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4058"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4058",
"url": "https://www.suse.com/security/cve/CVE-2021-4058"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4058",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4058"
},
{
"cve": "CVE-2021-4059",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4059"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4059",
"url": "https://www.suse.com/security/cve/CVE-2021-4059"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4059",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4059"
},
{
"cve": "CVE-2021-4061",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4061"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4061",
"url": "https://www.suse.com/security/cve/CVE-2021-4061"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4061",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4061"
},
{
"cve": "CVE-2021-4062",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4062"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4062",
"url": "https://www.suse.com/security/cve/CVE-2021-4062"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4062",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4062"
},
{
"cve": "CVE-2021-4063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4063"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4063",
"url": "https://www.suse.com/security/cve/CVE-2021-4063"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4063",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4063"
},
{
"cve": "CVE-2021-4064",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4064"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4064",
"url": "https://www.suse.com/security/cve/CVE-2021-4064"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4064",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4064"
},
{
"cve": "CVE-2021-4065",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4065"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4065",
"url": "https://www.suse.com/security/cve/CVE-2021-4065"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4065",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4065"
},
{
"cve": "CVE-2021-4066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4066"
}
],
"notes": [
{
"category": "general",
"text": "Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4066",
"url": "https://www.suse.com/security/cve/CVE-2021-4066"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4066",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4066"
},
{
"cve": "CVE-2021-4067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4067"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4067",
"url": "https://www.suse.com/security/cve/CVE-2021-4067"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4067",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4067"
},
{
"cve": "CVE-2021-4068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4068"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4068",
"url": "https://www.suse.com/security/cve/CVE-2021-4068"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4068",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4068"
},
{
"cve": "CVE-2021-4078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4078"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4078",
"url": "https://www.suse.com/security/cve/CVE-2021-4078"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4078",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4078"
},
{
"cve": "CVE-2021-4079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4079"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4079",
"url": "https://www.suse.com/security/cve/CVE-2021-4079"
},
{
"category": "external",
"summary": "SUSE Bug 1193519 for CVE-2021-4079",
"url": "https://bugzilla.suse.com/1193519"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4079"
},
{
"cve": "CVE-2021-4098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4098"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4098",
"url": "https://www.suse.com/security/cve/CVE-2021-4098"
},
{
"category": "external",
"summary": "SUSE Bug 1193713 for CVE-2021-4098",
"url": "https://bugzilla.suse.com/1193713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4098"
},
{
"cve": "CVE-2021-4099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4099"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4099",
"url": "https://www.suse.com/security/cve/CVE-2021-4099"
},
{
"category": "external",
"summary": "SUSE Bug 1193713 for CVE-2021-4099",
"url": "https://bugzilla.suse.com/1193713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4099"
},
{
"cve": "CVE-2021-4100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4100"
}
],
"notes": [
{
"category": "general",
"text": "Object lifecycle issue in ANGLE in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4100",
"url": "https://www.suse.com/security/cve/CVE-2021-4100"
},
{
"category": "external",
"summary": "SUSE Bug 1193713 for CVE-2021-4100",
"url": "https://bugzilla.suse.com/1193713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4100"
},
{
"cve": "CVE-2021-4101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4101"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4101",
"url": "https://www.suse.com/security/cve/CVE-2021-4101"
},
{
"category": "external",
"summary": "SUSE Bug 1193713 for CVE-2021-4101",
"url": "https://bugzilla.suse.com/1193713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4101"
},
{
"cve": "CVE-2021-4102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-4102"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-4102",
"url": "https://www.suse.com/security/cve/CVE-2021-4102"
},
{
"category": "external",
"summary": "SUSE Bug 1193713 for CVE-2021-4102",
"url": "https://bugzilla.suse.com/1193713"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2021-4102"
},
{
"cve": "CVE-2022-0096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0096"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Storage in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0096",
"url": "https://www.suse.com/security/cve/CVE-2022-0096"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0096",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0096",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0096"
},
{
"cve": "CVE-2022-0097",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0097"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in DevTools in Google Chrome prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to to potentially allow extension to escape the sandbox via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0097",
"url": "https://www.suse.com/security/cve/CVE-2022-0097"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0097",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0097",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0097"
},
{
"cve": "CVE-2022-0098",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0098"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Screen Capture in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gestures.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0098",
"url": "https://www.suse.com/security/cve/CVE-2022-0098"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0098",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0098",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0098"
},
{
"cve": "CVE-2022-0099",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0099"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Sign-in in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gesture.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0099",
"url": "https://www.suse.com/security/cve/CVE-2022-0099"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0099",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0099",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0099"
},
{
"cve": "CVE-2022-0100",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0100"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Media streams API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0100",
"url": "https://www.suse.com/security/cve/CVE-2022-0100"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0100",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0100",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0100"
},
{
"cve": "CVE-2022-0101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0101"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Bookmarks in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via specific user gesture.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0101",
"url": "https://www.suse.com/security/cve/CVE-2022-0101"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0101",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0101",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0101"
},
{
"cve": "CVE-2022-0102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0102"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0102",
"url": "https://www.suse.com/security/cve/CVE-2022-0102"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0102",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0102",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0102"
},
{
"cve": "CVE-2022-0103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0103"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in SwiftShader in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0103",
"url": "https://www.suse.com/security/cve/CVE-2022-0103"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0103",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0103",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0103"
},
{
"cve": "CVE-2022-0104",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0104"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in ANGLE in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0104",
"url": "https://www.suse.com/security/cve/CVE-2022-0104"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0104",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0104",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0104"
},
{
"cve": "CVE-2022-0105",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0105"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in PDF Accessibility in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0105",
"url": "https://www.suse.com/security/cve/CVE-2022-0105"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0105",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0105",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0105"
},
{
"cve": "CVE-2022-0106",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0106"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0106",
"url": "https://www.suse.com/security/cve/CVE-2022-0106"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0106",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0106",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0106"
},
{
"cve": "CVE-2022-0107",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0107"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in File Manager API in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0107",
"url": "https://www.suse.com/security/cve/CVE-2022-0107"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0107",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0107",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0107"
},
{
"cve": "CVE-2022-0108",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0108"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0108",
"url": "https://www.suse.com/security/cve/CVE-2022-0108"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0108",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1210731 for CVE-2022-0108",
"url": "https://bugzilla.suse.com/1210731"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0108",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0108"
},
{
"cve": "CVE-2022-0109",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0109"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0109",
"url": "https://www.suse.com/security/cve/CVE-2022-0109"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0109",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0109",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0109"
},
{
"cve": "CVE-2022-0110",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0110"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0110",
"url": "https://www.suse.com/security/cve/CVE-2022-0110"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0110",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0110",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0110"
},
{
"cve": "CVE-2022-0111",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0111"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to incorrectly set origin via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0111",
"url": "https://www.suse.com/security/cve/CVE-2022-0111"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0111",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0111",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0111"
},
{
"cve": "CVE-2022-0112",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0112"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect security UI in Browser UI in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to display missing URL or incorrect URL via a crafted URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0112",
"url": "https://www.suse.com/security/cve/CVE-2022-0112"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0112",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0112",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0112"
},
{
"cve": "CVE-2022-0113",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0113"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0113",
"url": "https://www.suse.com/security/cve/CVE-2022-0113"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0113",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0113",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0113"
},
{
"cve": "CVE-2022-0114",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0114"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in Blink Serial API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page and virtual serial port driver.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0114",
"url": "https://www.suse.com/security/cve/CVE-2022-0114"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0114",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0114",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0114"
},
{
"cve": "CVE-2022-0115",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0115"
}
],
"notes": [
{
"category": "general",
"text": "Uninitialized use in File API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0115",
"url": "https://www.suse.com/security/cve/CVE-2022-0115"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0115",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0115",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0115"
},
{
"cve": "CVE-2022-0116",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0116"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Compositing in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0116",
"url": "https://www.suse.com/security/cve/CVE-2022-0116"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0116",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0116",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0116"
},
{
"cve": "CVE-2022-0117",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0117"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0117",
"url": "https://www.suse.com/security/cve/CVE-2022-0117"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0117",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0117",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0117"
},
{
"cve": "CVE-2022-0118",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0118"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in WebShare in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0118",
"url": "https://www.suse.com/security/cve/CVE-2022-0118"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0118",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0118",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0118"
},
{
"cve": "CVE-2022-0120",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0120"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Passwords in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially leak cross-origin data via a malicious website.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0120",
"url": "https://www.suse.com/security/cve/CVE-2022-0120"
},
{
"category": "external",
"summary": "SUSE Bug 1194331 for CVE-2022-0120",
"url": "https://bugzilla.suse.com/1194331"
},
{
"category": "external",
"summary": "SUSE Bug 1213802 for CVE-2022-0120",
"url": "https://bugzilla.suse.com/1213802"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0120"
},
{
"cve": "CVE-2022-0289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0289"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Safe browsing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0289",
"url": "https://www.suse.com/security/cve/CVE-2022-0289"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0289",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0289"
},
{
"cve": "CVE-2022-0290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0290"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Site isolation in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0290",
"url": "https://www.suse.com/security/cve/CVE-2022-0290"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0290",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0290"
},
{
"cve": "CVE-2022-0291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0291"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Storage in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0291",
"url": "https://www.suse.com/security/cve/CVE-2022-0291"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0291",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0291"
},
{
"cve": "CVE-2022-0292",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0292"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Fenced Frames in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0292",
"url": "https://www.suse.com/security/cve/CVE-2022-0292"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0292",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0292"
},
{
"cve": "CVE-2022-0293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0293"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Web packaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0293",
"url": "https://www.suse.com/security/cve/CVE-2022-0293"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0293",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0293"
},
{
"cve": "CVE-2022-0294",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0294"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Push messaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0294",
"url": "https://www.suse.com/security/cve/CVE-2022-0294"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0294",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0294"
},
{
"cve": "CVE-2022-0295",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0295"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0295",
"url": "https://www.suse.com/security/cve/CVE-2022-0295"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0295",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0295"
},
{
"cve": "CVE-2022-0296",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0296"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Printing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0296",
"url": "https://www.suse.com/security/cve/CVE-2022-0296"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0296",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0296"
},
{
"cve": "CVE-2022-0297",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0297"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Vulkan in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0297",
"url": "https://www.suse.com/security/cve/CVE-2022-0297"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0297",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0297"
},
{
"cve": "CVE-2022-0298",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0298"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Scheduling in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0298",
"url": "https://www.suse.com/security/cve/CVE-2022-0298"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0298",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0298"
},
{
"cve": "CVE-2022-0300",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0300"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Text Input Method Editor in Google Chrome on Android prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0300",
"url": "https://www.suse.com/security/cve/CVE-2022-0300"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0300",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0300"
},
{
"cve": "CVE-2022-0301",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0301"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in DevTools in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0301",
"url": "https://www.suse.com/security/cve/CVE-2022-0301"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0301",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0301"
},
{
"cve": "CVE-2022-0302",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0302"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0302",
"url": "https://www.suse.com/security/cve/CVE-2022-0302"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0302",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0302"
},
{
"cve": "CVE-2022-0304",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0304"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Bookmarks in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0304",
"url": "https://www.suse.com/security/cve/CVE-2022-0304"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0304",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0304"
},
{
"cve": "CVE-2022-0305",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0305"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0305",
"url": "https://www.suse.com/security/cve/CVE-2022-0305"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0305",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0305"
},
{
"cve": "CVE-2022-0306",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0306"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in PDFium in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0306",
"url": "https://www.suse.com/security/cve/CVE-2022-0306"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0306",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0306"
},
{
"cve": "CVE-2022-0307",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0307"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Optimization Guide in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0307",
"url": "https://www.suse.com/security/cve/CVE-2022-0307"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0307",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0307"
},
{
"cve": "CVE-2022-0308",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0308"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Data Transfer in Google Chrome on Chrome OS prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0308",
"url": "https://www.suse.com/security/cve/CVE-2022-0308"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0308",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0308"
},
{
"cve": "CVE-2022-0309",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0309"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0309",
"url": "https://www.suse.com/security/cve/CVE-2022-0309"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0309",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0309"
},
{
"cve": "CVE-2022-0310",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0310"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0310",
"url": "https://www.suse.com/security/cve/CVE-2022-0310"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0310",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0310"
},
{
"cve": "CVE-2022-0311",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0311"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0311",
"url": "https://www.suse.com/security/cve/CVE-2022-0311"
},
{
"category": "external",
"summary": "SUSE Bug 1194919 for CVE-2022-0311",
"url": "https://bugzilla.suse.com/1194919"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0311"
},
{
"cve": "CVE-2022-0452",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0452"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Safe Browsing in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0452",
"url": "https://www.suse.com/security/cve/CVE-2022-0452"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0452",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0452"
},
{
"cve": "CVE-2022-0453",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0453"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Reader Mode in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0453",
"url": "https://www.suse.com/security/cve/CVE-2022-0453"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0453",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0453"
},
{
"cve": "CVE-2022-0454",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0454"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in ANGLE in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0454",
"url": "https://www.suse.com/security/cve/CVE-2022-0454"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0454",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0454"
},
{
"cve": "CVE-2022-0455",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0455"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Full Screen Mode in Google Chrome on Android prior to 98.0.4758.80 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0455",
"url": "https://www.suse.com/security/cve/CVE-2022-0455"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0455",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0455"
},
{
"cve": "CVE-2022-0456",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0456"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Web Search in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via profile destruction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0456",
"url": "https://www.suse.com/security/cve/CVE-2022-0456"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0456",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0456"
},
{
"cve": "CVE-2022-0457",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0457"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0457",
"url": "https://www.suse.com/security/cve/CVE-2022-0457"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0457",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0457"
},
{
"cve": "CVE-2022-0458",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0458"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Thumbnail Tab Strip in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0458",
"url": "https://www.suse.com/security/cve/CVE-2022-0458"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0458",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0458"
},
{
"cve": "CVE-2022-0459",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0459"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Screen Capture in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who had compromised the renderer process and convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0459",
"url": "https://www.suse.com/security/cve/CVE-2022-0459"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0459",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0459"
},
{
"cve": "CVE-2022-0460",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0460"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Window Dialogue in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0460",
"url": "https://www.suse.com/security/cve/CVE-2022-0460"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0460",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0460"
},
{
"cve": "CVE-2022-0461",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0461"
}
],
"notes": [
{
"category": "general",
"text": "Policy bypass in COOP in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to bypass iframe sandbox via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0461",
"url": "https://www.suse.com/security/cve/CVE-2022-0461"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0461",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0461"
},
{
"cve": "CVE-2022-0462",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0462"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Scroll in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0462",
"url": "https://www.suse.com/security/cve/CVE-2022-0462"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0462",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0462"
},
{
"cve": "CVE-2022-0463",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0463"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0463",
"url": "https://www.suse.com/security/cve/CVE-2022-0463"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0463",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0463"
},
{
"cve": "CVE-2022-0464",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0464"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Accessibility in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0464",
"url": "https://www.suse.com/security/cve/CVE-2022-0464"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0464",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0464"
},
{
"cve": "CVE-2022-0465",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0465"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Extensions in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via user interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0465",
"url": "https://www.suse.com/security/cve/CVE-2022-0465"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0465",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0465"
},
{
"cve": "CVE-2022-0466",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0466"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Extensions Platform in Google Chrome prior to 98.0.4758.80 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0466",
"url": "https://www.suse.com/security/cve/CVE-2022-0466"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0466",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0466"
},
{
"cve": "CVE-2022-0467",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0467"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Pointer Lock in Google Chrome on Windows prior to 98.0.4758.80 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0467",
"url": "https://www.suse.com/security/cve/CVE-2022-0467"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0467",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0467"
},
{
"cve": "CVE-2022-0468",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0468"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Payments in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0468",
"url": "https://www.suse.com/security/cve/CVE-2022-0468"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0468",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0468"
},
{
"cve": "CVE-2022-0469",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0469"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Cast in Google Chrome prior to 98.0.4758.80 allowed a remote attacker who convinced a user to engage in specific interactions to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0469",
"url": "https://www.suse.com/security/cve/CVE-2022-0469"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0469",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0469"
},
{
"cve": "CVE-2022-0470",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0470"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in V8 in Google Chrome prior to 98.0.4758.80 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0470",
"url": "https://www.suse.com/security/cve/CVE-2022-0470"
},
{
"category": "external",
"summary": "SUSE Bug 1195420 for CVE-2022-0470",
"url": "https://bugzilla.suse.com/1195420"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0470"
},
{
"cve": "CVE-2022-0603",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0603"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in File Manager in Google Chrome on Chrome OS prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0603",
"url": "https://www.suse.com/security/cve/CVE-2022-0603"
},
{
"category": "external",
"summary": "SUSE Bug 1195986 for CVE-2022-0603",
"url": "https://bugzilla.suse.com/1195986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-0603"
},
{
"cve": "CVE-2022-0604",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0604"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Tab Groups in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0604",
"url": "https://www.suse.com/security/cve/CVE-2022-0604"
},
{
"category": "external",
"summary": "SUSE Bug 1195986 for CVE-2022-0604",
"url": "https://bugzilla.suse.com/1195986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-0604"
},
{
"cve": "CVE-2022-0605",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0605"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Webstore API in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and convinced a user to enage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0605",
"url": "https://www.suse.com/security/cve/CVE-2022-0605"
},
{
"category": "external",
"summary": "SUSE Bug 1195986 for CVE-2022-0605",
"url": "https://bugzilla.suse.com/1195986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-0605"
},
{
"cve": "CVE-2022-0606",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0606"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in ANGLE in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0606",
"url": "https://www.suse.com/security/cve/CVE-2022-0606"
},
{
"category": "external",
"summary": "SUSE Bug 1195986 for CVE-2022-0606",
"url": "https://bugzilla.suse.com/1195986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-0606"
},
{
"cve": "CVE-2022-0607",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0607"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in GPU in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0607",
"url": "https://www.suse.com/security/cve/CVE-2022-0607"
},
{
"category": "external",
"summary": "SUSE Bug 1195986 for CVE-2022-0607",
"url": "https://bugzilla.suse.com/1195986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-0607"
},
{
"cve": "CVE-2022-0608",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0608"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in Mojo in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0608",
"url": "https://www.suse.com/security/cve/CVE-2022-0608"
},
{
"category": "external",
"summary": "SUSE Bug 1195986 for CVE-2022-0608",
"url": "https://bugzilla.suse.com/1195986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-0608"
},
{
"cve": "CVE-2022-0609",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0609"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0609",
"url": "https://www.suse.com/security/cve/CVE-2022-0609"
},
{
"category": "external",
"summary": "SUSE Bug 1195986 for CVE-2022-0609",
"url": "https://bugzilla.suse.com/1195986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-0609"
},
{
"cve": "CVE-2022-0610",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0610"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0610",
"url": "https://www.suse.com/security/cve/CVE-2022-0610"
},
{
"category": "external",
"summary": "SUSE Bug 1195986 for CVE-2022-0610",
"url": "https://bugzilla.suse.com/1195986"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-0610"
},
{
"cve": "CVE-2022-0789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0789"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in ANGLE in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0789",
"url": "https://www.suse.com/security/cve/CVE-2022-0789"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0789",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0789"
},
{
"cve": "CVE-2022-0790",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0790"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially perform a sandbox escape via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0790",
"url": "https://www.suse.com/security/cve/CVE-2022-0790"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0790",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.6,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0790"
},
{
"cve": "CVE-2022-0791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0791"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Omnibox in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via user interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0791",
"url": "https://www.suse.com/security/cve/CVE-2022-0791"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0791",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0791"
},
{
"cve": "CVE-2022-0792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0792"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds read in ANGLE in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0792",
"url": "https://www.suse.com/security/cve/CVE-2022-0792"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0792",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0792"
},
{
"cve": "CVE-2022-0793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0793"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Cast in Google Chrome prior to 99.0.4844.51 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0793",
"url": "https://www.suse.com/security/cve/CVE-2022-0793"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0793",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0793"
},
{
"cve": "CVE-2022-0794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0794"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in WebShare in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0794",
"url": "https://www.suse.com/security/cve/CVE-2022-0794"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0794",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0794"
},
{
"cve": "CVE-2022-0795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0795"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in Blink Layout in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0795",
"url": "https://www.suse.com/security/cve/CVE-2022-0795"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0795",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0795"
},
{
"cve": "CVE-2022-0796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0796"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Media in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0796",
"url": "https://www.suse.com/security/cve/CVE-2022-0796"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0796",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0796"
},
{
"cve": "CVE-2022-0797",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0797"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in Mojo in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0797",
"url": "https://www.suse.com/security/cve/CVE-2022-0797"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0797",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0797"
},
{
"cve": "CVE-2022-0798",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0798"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in MediaStream in Google Chrome prior to 99.0.4844.51 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0798",
"url": "https://www.suse.com/security/cve/CVE-2022-0798"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0798",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0798"
},
{
"cve": "CVE-2022-0799",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0799"
}
],
"notes": [
{
"category": "general",
"text": "Insufficient policy enforcement in Installer in Google Chrome on Windows prior to 99.0.4844.51 allowed a remote attacker to perform local privilege escalation via a crafted offline installer file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0799",
"url": "https://www.suse.com/security/cve/CVE-2022-0799"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0799",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0799"
},
{
"cve": "CVE-2022-0800",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0800"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in Cast UI in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0800",
"url": "https://www.suse.com/security/cve/CVE-2022-0800"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0800",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0800"
},
{
"cve": "CVE-2022-0801",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0801"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in HTML parser in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to bypass XSS preventions via a crafted HTML page. (Chrome security severity: Medium)",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0801",
"url": "https://www.suse.com/security/cve/CVE-2022-0801"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0801",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0801"
},
{
"cve": "CVE-2022-0802",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0802"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0802",
"url": "https://www.suse.com/security/cve/CVE-2022-0802"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0802",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0802"
},
{
"cve": "CVE-2022-0803",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0803"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Permissions in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to tamper with the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0803",
"url": "https://www.suse.com/security/cve/CVE-2022-0803"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0803",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0803"
},
{
"cve": "CVE-2022-0804",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0804"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Full screen mode in Google Chrome on Android prior to 99.0.4844.51 allowed a remote attacker to hide the contents of the Omnibox (URL bar) via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0804",
"url": "https://www.suse.com/security/cve/CVE-2022-0804"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0804",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0804"
},
{
"cve": "CVE-2022-0805",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0805"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Browser Switcher in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via user interaction.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0805",
"url": "https://www.suse.com/security/cve/CVE-2022-0805"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0805",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0805"
},
{
"cve": "CVE-2022-0806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0806"
}
],
"notes": [
{
"category": "general",
"text": "Data leak in Canvas in Google Chrome prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in screen sharing to potentially leak cross-origin data via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0806",
"url": "https://www.suse.com/security/cve/CVE-2022-0806"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0806",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0806"
},
{
"cve": "CVE-2022-0807",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0807"
}
],
"notes": [
{
"category": "general",
"text": "Inappropriate implementation in Autofill in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0807",
"url": "https://www.suse.com/security/cve/CVE-2022-0807"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0807",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0807"
},
{
"cve": "CVE-2022-0808",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0808"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Chrome OS Shell in Google Chrome on Chrome OS prior to 99.0.4844.51 allowed a remote attacker who convinced a user to engage in a series of user interaction to potentially exploit heap corruption via user interactions.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0808",
"url": "https://www.suse.com/security/cve/CVE-2022-0808"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0808",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0808"
},
{
"cve": "CVE-2022-0809",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-0809"
}
],
"notes": [
{
"category": "general",
"text": "Out of bounds memory access in WebXR in Google Chrome prior to 99.0.4844.51 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-0809",
"url": "https://www.suse.com/security/cve/CVE-2022-0809"
},
{
"category": "external",
"summary": "SUSE Bug 1196641 for CVE-2022-0809",
"url": "https://bugzilla.suse.com/1196641"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "critical"
}
],
"title": "CVE-2022-0809"
},
{
"cve": "CVE-2022-1096",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1096"
}
],
"notes": [
{
"category": "general",
"text": "Type confusion in V8 in Google Chrome prior to 99.0.4844.84 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1096",
"url": "https://www.suse.com/security/cve/CVE-2022-1096"
},
{
"category": "external",
"summary": "SUSE Bug 1197552 for CVE-2022-1096",
"url": "https://bugzilla.suse.com/1197552"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.4 NonFree:opera-85.0.4341.28-lp154.2.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-04-08T14:01:17Z",
"details": "important"
}
],
"title": "CVE-2022-1096"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…